Hello, we have a following integration in place: GuardDuty -> EventBridge (no transformation)-> Firehose (no transformation) -> Splunk (cloud) HEC sourcetype = aws:cloudwatch:guardduty HEC source override = aws_cloudwatchevents_guardduty Despite source override sometimes we see events with aws.guardduty source, and in those cases the message format is different (thus search outputs no results so we do not get an alert). Single source events start with: {"schemaVersion":"2.0","accountId":"<some_account>","region":"<aws_region>","partition":...} Double source events start with (additional header/metadata preceding schemaVersion): {"version":"0","id":"<some_id>","detail-type":"GuardDuty Finding","source":"aws.guardduty","account":"<some_account>","time":"2022-09-07T11:55:02Z","region":"<aws_region>","resources":[],"detail":{"schemaVersion":"2.0","accountId":"<some_account>","region":"<aws_region>","partition":...} AWS has been excluded as the source of the issue. Any ideas on how to have only one message format (Splunk Support ticket has also been submitted) ?
... View more