Splunk SOAR

How to add filed from raw data into artifacts

Qingguo
Engager

when the original syslog was forwarded to phantom, some key filed(like srcIP/dstIP) was missing artifact.   these key filed was in raw_data if we search artifiact in splunk.

can phantom identify/parse these field and add artifact automatically ?

Labels (1)
Tags (1)
0 Karma

Qingguo
Engager

It has been resolved by installing add-on and mapping cef field ,  thanks

0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...