All Apps and Add-ons

Splunk Add-on for Microsoft Windows: Is this a bug with the field alias for severity_id in props.conf?

otaci
Explorer

In file default/props.conf the following aliases are defined:

[source::(MonitorWare|NTSyslog|Snare|WinEventLog|WMI:WinEventLog)...]
...
FIELDALIAS-severity_for_windows = Type as severity
FIELDALIAS-severity_id_for_windows = EventType as severity
...

Is this a bug? Should the second alias not read:

FIELDALIAS-severity_id_for_windows = EventType as severity_id

I've corrected this by overriding with a correction section in local/props.conf.

1 Solution

jcoates_splunk
Splunk Employee
Splunk Employee

Yes, I agree. Filed as a bug.

View solution in original post

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

Yes, I agree. Filed as a bug.

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...