Skip to content
This repository was archived by the owner on Dec 14, 2024. It is now read-only.

Commit 6f290d0

Browse files
committed
fix(addon): CDL threat_name field more robust
Fixes #234 The threat_name field can now pull from the ThreatName field if it exists, or the ThreatID field as a backup.
1 parent af609bc commit 6f290d0

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

Splunk_TA_paloalto/default/props.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ FIELDALIAS-fwcloud_src_zone = FromZone as src_zone
8484
FIELDALIAS-fwcloud_start_time = SessionStartTime as start_time
8585
FIELDALIAS-fwcloud_threat_category = ThreatCategory as threat_category
8686
FIELDALIAS-fwcloud_threat = ThreatID as threat
87-
FIELDALIAS-fwcloud_threat_name = ThreatName as threat_name
87+
EVAL-threat_name = coalesce(ThreatName, ThreatNameFromID)
8888
FIELDALIAS-fwcloud_transport = Protocol as transport
8989
FIELDALIAS-fwcloud_type = LogType as type
9090
FIELDALIAS-fwcloud_log_type = LogType as log_type

Splunk_TA_paloalto/default/transforms.conf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ REGEX = \((?<threat_id>\d+)\)
146146

147147
[extract_threat_name_cloud]
148148
SOURCE_KEY = ThreatID
149-
REGEX = ^(?<threat_name>[^(]*)
149+
REGEX = ^(?<ThreatNameFromID>[^(]*)
150150

151151
[extract_dest_hostname_cloud]
152152
SOURCE_KEY = URL

0 commit comments

Comments
 (0)