Palo Alto Networks App for Splunk leverages the data visibility provided by Palo Alto Networks next-generation firewalls and endpoint security with Splunk's extensive investigation and visualization capabilities to deliver an advanced security reporting and analysis tool.
Description
When using the Cortex API input, the event time is incorrectly extracted as the index time
Expected behavior
There are available fields in the JSON data set that are more suitable for the
_time
field.Specifically the
creation_time
field would be best given the sourcetype is set as "incident" and represents this event more closely.Current behavior
The
indextime
is used for the event which is misleading.Possible solution
Specify timestamp recognition using
props.conf
."Hacky" example below that I haven't tested:
See this page for more detail.
Steps to reproduce
index
).Screenshots
N/A. I would have to redact too much data.
(use the SPL above on an example data set).
Context
Accurate time representation is critical to correlated activity.
Decreased API frequency (i.e. longer in-between) will exacerbate time skew.
Your Environment
Splunk Cloud
9.0.2205.1
Palo Alto Networks Add on7.1.0