I need to create a field aliase by event type. I saw that it is possible to reference an eventtype from the props.conf:
I am running Splunk 6.3.1
I've tried the following without success:
[eventtype::opsec_vpn_bachata] FIELDALIAS-user_for_opsec_vpn_bachata = user_dn as user FIELDALIAS-user_for_opsec_vpn_bachata_cust = user_dn as user_cust LOOKUP-action_for_opsec_bachata = te_action_lookup te_action OUTPUT action
[opsec_vpn_bachata] search = index="opsec-lea-cust" orig=bachata event_type=Login #tags = vpn authentication*
Thank you very much.
I worked on the very similar problem right now but I had a to match on a mv field.
So i used something like this:
EVAL-action = if(mvfind(eventtype,"usp_nac-state_change")=1, "modified", null())
Maybe it helps someone in the future 🙂
This shouldn't work, because the calculated fields are made well before the typer even runs.
Typer and thus eventtypes, don't exist until after all the other props.conf stuff is done -- extractions, Aliases, calculated fields and lookups.
I would open a support case. That "feature" is documented only in v6.3.0 and v6.3.1 of props.conf but disappears from v6.3.2 documentation versions and later. I can find no mention of the feature being added or deleted in any of the v6.* release notes. Did this ever work? What is the story? Only splunk can say.