Skip to main content


Hi is there a method of ingesting events without flattening the data?

for example;


_rawDataFields


vulnerabilities_96_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30575
"


vulnerabilities_95_score "6.8"


vulnerabilities_10_cve "CVE-2021-21160"


vulnerabilities_30_score "6.8"


vulnerabilities_127_score "6.8"


vulnerabilities_128_cve "CVE-2021-37973"


vulnerabilities_26_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21197
"


vulnerabilities_168_score "6.8"


vulnerabilities_161_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4053
"


vulnerabilities_58_cve "CVE-2021-30523"


vulnerabilities_55_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30519
"


vulnerabilities_127_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37972
"


vulnerabilities_154_cve "CVE-2021-38012"


vulnerabilities_68_score "6.8"


vulnerabilities_62_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30527
"


vulnerabilities_66_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30541
"


vulnerabilities_41_cve "CVE-2021-21227"


file_file_name "Google Chrome"


vulnerabilities_96_cve "CVE-2021-30575"


vulnerabilities_167_score "6.8"


vulnerabilities_74_cve "CVE-2021-30549"


vulnerabilities_125_score "6.8"


vulnerabilities_72_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30547
"


vulnerabilities_118_cve "CVE-2021-30629"


vulnerabilities_49_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30513
"


vulnerabilities_118_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30629
"


vulnerabilities_20_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21190
"


vulnerabilities_31_cve "CVE-2021-21204"


vulnerabilities_8_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21156
"


vulnerabilities_2_score "6.8"


vulnerabilities_98_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30577
"


vulnerabilities_118_score "6.8"


vulnerabilities_48_cve "CVE-2021-30512"


vulnerabilities_4_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21146
"


vulnerabilities_25_score "6.8"


vulnerabilities_156_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38014
"


vulnerabilities_150_score "6.8"


vulnerabilities_139_cve "CVE-2021-37986"


vulnerabilities_38_score "6.8"


vulnerabilities_117_cve "CVE-2021-30628"


vulnerabilities_105_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30590
"


vulnerabilities_9_score "6.8"


vulnerabilities_49_score "6.8"


vulnerabilities_124_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37961
"


vulnerabilities_61_score "6.8"


vulnerabilities_123_cve "CVE-2021-37959"


vulnerabilities_41_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21227
"


computer_active "True"


vulnerabilities_101_score "6.8"


vulnerabilities_141_cve "CVE-2021-37988"


vulnerabilities_75_score "6.8"


vulnerabilities_14_score "6.8"


vulnerabilities_140_score "6.8"


vulnerabilities_174_url "
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4079
"


vulnerabilities_42_score "6.8"


Hi
@Mark Rodman



Siemplify platform does not support that. So it's flattening the data to make things easier, but we would love to hear from you what you have to try to accomplish or your specific pain point so we can think about that.



I wrote an action and reinflated the data to a JSON structure.



Can you please share the exact use case you had to reinflate the event data for?



Cisco Secure Endpoint (AMP) data, the event type was Vulnerable Application Detected.



Hi
@Mark Rodman
, it's Tom here from the product management team. I'll contact you in direct message to get more details about your issue


Reply