From a1d07ed8da845896212c352f265784114907b1c5 Mon Sep 17 00:00:00 2001 From: Ryan Faircloth <35384120+rfaircloth-splunk@users.noreply.github.com> Date: Wed, 26 Aug 2020 17:37:50 -0400 Subject: [PATCH] [filtermod] Fix vendor_product lookup for LEEF (#666) --- .../conf.d/log_paths/lp-log_extended_event_format.conf.tmpl | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/package/etc/conf.d/log_paths/lp-log_extended_event_format.conf.tmpl b/package/etc/conf.d/log_paths/lp-log_extended_event_format.conf.tmpl index c785cde..e3c1797 100644 --- a/package/etc/conf.d/log_paths/lp-log_extended_event_format.conf.tmpl +++ b/package/etc/conf.d/log_paths/lp-log_extended_event_format.conf.tmpl @@ -83,7 +83,7 @@ class leef_kv(object): else: log_message['.splunk.sourcetype'] = f"LEEF:{lv}:{hex_sep}" log_message['.splunk.source'] = f"{structure[1]}:{structure[2]}" - log_message['fields.sc4s_vendor_product'] = f"{structure[1]}:{structure[2]}" + log_message['fields.sc4s_vendor_product'] = f"{structure[1]}_{structure[2]}" pairs = event.split(separator) for p in pairs: @@ -155,7 +155,7 @@ log { # leef source entries in splunk_metadata.csv should reflect the proper source as well as sourcetype parser { - p_add_context_splunk(key("${fields.leef_device_vendor}_${fields.leef_device_product}")); + p_add_context_splunk(key("${fields.leef_vendor}_${fields.leef_product}")); }; parser (compliance_meta_by_source);