Splunk Enterprise Security

How to identify eventtype in props.conf

shayhibah
Path Finder

Hey,

I have one sourcetype named "my_sourcetype".

Since I would like to integrate with Splunk ES, I need to map my field values into expected values.

Each data model (eventtype) is defined in eventtypes.conf file based on my product name.

For example:

[Data_Loss_Prevention]
search = product="*DLP*"

[Malware]
search = product="*Malware*"

Since one field (for example: action) may have different expected values for each data model, in my props.conf file I need to map the value to the expected value based on the correct DM.

Since eventtype happens after EVAL in search-time process, I cannot use eventtype field and I have no way to identify which data model is it (just to mention that I do not want to copy the logic of eventtypes.conf into props.conf to avoid redundancy).

 

Can you think on a better way to do this?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The best way to map your fields to expected (I assume you mean CIM) fields is with aliases.  Add FIELDALIAS to your props.conf file(s) as necessary.

You also may need to modify event types so they can find your data.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

How to Monitor Google Kubernetes Engine (GKE)

We’ve looked at how to integrate Kubernetes environments with Splunk Observability Cloud, but what about ...

Index This | How can you make 45 using only 4?

October 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

Splunk Education Goes to Washington | Splunk GovSummit 2024

If you’re in the Washington, D.C. area, this is your opportunity to take your career and Splunk skills to the ...