Splunk Enterprise Security

How to identify eventtype in props.conf

shayhibah
Path Finder

Hey,

I have one sourcetype named "my_sourcetype".

Since I would like to integrate with Splunk ES, I need to map my field values into expected values.

Each data model (eventtype) is defined in eventtypes.conf file based on my product name.

For example:

[Data_Loss_Prevention]
search = product="*DLP*"

[Malware]
search = product="*Malware*"

Since one field (for example: action) may have different expected values for each data model, in my props.conf file I need to map the value to the expected value based on the correct DM.

Since eventtype happens after EVAL in search-time process, I cannot use eventtype field and I have no way to identify which data model is it (just to mention that I do not want to copy the logic of eventtypes.conf into props.conf to avoid redundancy).

 

Can you think on a better way to do this?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The best way to map your fields to expected (I assume you mean CIM) fields is with aliases.  Add FIELDALIAS to your props.conf file(s) as necessary.

You also may need to modify event types so they can find your data.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

New This Month - Observability Updates Give Extended Visibility and Improve User ...

This month is a collection of special news! From Magic Quadrant updates to AppDynamics integrations to ...

Intro to Splunk Synthetic Monitoring

In our last post, we mentioned that the 3 key pieces of observability – metrics, logs, and traces – provide ...