Splunk Enterprise Security

Normalize action field values

splunkcol
Builder

I have an index called firewall and sourcetypes of Palo Alto, Checkpoint and Fortinet routers

The configuration was carried out according to the documentation recommendations regarding recommended sourcertype and Add-on according to the vendor

The "action" type fields that are accepted have different names depending on the brand of the device

Those that are accepted are:

allowed
accept
Authorize
pass

Taking into account that "accept" and "allowed" mean the same thing, should I normalize them? or as they are already recognized by the correlation events that Splunk ES has created?

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Aliases create new fields with different names, but the same values so they won't help normalize values.  Use eval.

 

EVAL action=if(action="accept" OR action="Authorize" OR action="pass", "allowed", action)

 

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Splunk ES expects normalized field values as documented in the Common Information Model (CIM).  The TAs for those sources should have normalized the fields for you, but if they did not (or you don't use TAs) then you'll have to do so.

---
If this reply helps you, Karma would be appreciated.

splunkcol
Builder

should I do it through aliases?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Aliases create new fields with different names, but the same values so they won't help normalize values.  Use eval.

 

EVAL action=if(action="accept" OR action="Authorize" OR action="pass", "allowed", action)

 

---
If this reply helps you, Karma would be appreciated.

splunkcol
Builder

@richgalloway  Last question, what is the correct way to normalize it in this case?

0 Karma

richgalloway
SplunkTrust
SplunkTrust
Like with many things Splunk,there is more than one way to do it. The "correct" one is the one that works for you.
---
If this reply helps you, Karma would be appreciated.
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...