- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
01-30-2024 01:10 PM
Hi everyone,
I get data from splunk with the "search index=notable" query using Splunkpy. I assign the incoming data to the type named Splunk Generic Notable by default. Here, when an incident occurs, there are fields such as event_code, process_name in "labels". But on the mapper page, the label section comes empty. This data appears in _raw (in mapping page, but in incident page, data appears in labels and _raw). I want to assign some of these fields to incident fields, but I can't do it, where is the problem? What do I need to edit?
01-31-2024 12:00 PM
Hello,
Labels constitute all the unmapped data, meaning, if a field in the alert JSON is not mapped to an XSOAR field, the value ends up as a label.
You can use filters and transformers to extract fields from _raw and map them to XSOAR fields in the mapper.
Thanks,
Rahul Vijaydev
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!