Hi is there a method of ingesting events without flattening the data?
for example;
_rawDataFields
vulnerabilities_96_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30575
"
vulnerabilities_95_score "6.8"
vulnerabilities_10_cve "CVE-2021-21160"
vulnerabilities_30_score "6.8"
vulnerabilities_127_score "6.8"
vulnerabilities_128_cve "CVE-2021-37973"
vulnerabilities_26_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21197
"
vulnerabilities_168_score "6.8"
vulnerabilities_161_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4053
"
vulnerabilities_58_cve "CVE-2021-30523"
vulnerabilities_55_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30519
"
vulnerabilities_127_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37972
"
vulnerabilities_154_cve "CVE-2021-38012"
vulnerabilities_68_score "6.8"
vulnerabilities_62_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30527
"
vulnerabilities_66_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30541
"
vulnerabilities_41_cve "CVE-2021-21227"
file_file_name "Google Chrome"
vulnerabilities_96_cve "CVE-2021-30575"
vulnerabilities_167_score "6.8"
vulnerabilities_74_cve "CVE-2021-30549"
vulnerabilities_125_score "6.8"
vulnerabilities_72_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30547
"
vulnerabilities_118_cve "CVE-2021-30629"
vulnerabilities_49_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30513
"
vulnerabilities_118_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30629
"
vulnerabilities_20_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21190
"
vulnerabilities_31_cve "CVE-2021-21204"
vulnerabilities_8_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21156
"
vulnerabilities_2_score "6.8"
vulnerabilities_98_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30577
"
vulnerabilities_118_score "6.8"
vulnerabilities_48_cve "CVE-2021-30512"
vulnerabilities_4_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21146
"
vulnerabilities_25_score "6.8"
vulnerabilities_156_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38014
"
vulnerabilities_150_score "6.8"
vulnerabilities_139_cve "CVE-2021-37986"
vulnerabilities_38_score "6.8"
vulnerabilities_117_cve "CVE-2021-30628"
vulnerabilities_105_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30590
"
vulnerabilities_9_score "6.8"
vulnerabilities_49_score "6.8"
vulnerabilities_124_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37961
"
vulnerabilities_61_score "6.8"
vulnerabilities_123_cve "CVE-2021-37959"
vulnerabilities_41_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21227
"
computer_active "True"
vulnerabilities_101_score "6.8"
vulnerabilities_141_cve "CVE-2021-37988"
vulnerabilities_75_score "6.8"
vulnerabilities_14_score "6.8"
vulnerabilities_140_score "6.8"
vulnerabilities_174_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4079
"
vulnerabilities_42_score "6.8"
Hi
Siemplify platform does not support that. So it's flattening the data to make things easier, but we would love to hear from you what you have to try to accomplish or your specific pain point so we can think about that.
I wrote an action and reinflated the data to a JSON structure.
Can you please share the exact use case you had to reinflate the event data for?
Cisco Secure Endpoint (AMP) data, the event type was Vulnerable Application Detected.
Hi
, it's Tom here from the product management team. I'll contact you in direct message to get more details about your issue
Reply
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.