Splunk Enterprise Security

How to identify eventtype in props.conf

Path Finder


I have one sourcetype named "my_sourcetype".

Since I would like to integrate with Splunk ES, I need to map my field values into expected values.

Each data model (eventtype) is defined in eventtypes.conf file based on my product name.

For example:

search = product="*DLP*"

search = product="*Malware*"

Since one field (for example: action) may have different expected values for each data model, in my props.conf file I need to map the value to the expected value based on the correct DM.

Since eventtype happens after EVAL in search-time process, I cannot use eventtype field and I have no way to identify which data model is it (just to mention that I do not want to copy the logic of eventtypes.conf into props.conf to avoid redundancy).


Can you think on a better way to do this?

0 Karma


The best way to map your fields to expected (I assume you mean CIM) fields is with aliases.  Add FIELDALIAS to your props.conf file(s) as necessary.

You also may need to modify event types so they can find your data.

If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud | Unified Identity - Now Available for Existing Splunk ...

Raise your hand if you’ve already forgotten your username or password when logging into an account. (We can’t ...

Index This | How many sides does a circle have?

February 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Registration for Splunk University is Now Open!

Are you ready for an adventure in learning?   Brace yourselves because Splunk University is back, and it's ...