Skip to main content

Ingesting events without flattening the data

  • February 2, 2022
  • 5 replies
  • 21 views

Forum|alt.badge.img+4

Hi is there a method of ingesting events without flattening the data?
for example;
_rawDataFields
vulnerabilities_96_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30575 "
vulnerabilities_95_score "6.8"
vulnerabilities_10_cve "CVE-2021-21160"
vulnerabilities_30_score "6.8"
vulnerabilities_127_score "6.8"
vulnerabilities_128_cve "CVE-2021-37973"
vulnerabilities_26_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21197 "
vulnerabilities_168_score "6.8"
vulnerabilities_161_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4053 "
vulnerabilities_58_cve "CVE-2021-30523"
vulnerabilities_55_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30519 "
vulnerabilities_127_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37972 "
vulnerabilities_154_cve "CVE-2021-38012"
vulnerabilities_68_score "6.8"
vulnerabilities_62_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30527 "
vulnerabilities_66_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30541 "
vulnerabilities_41_cve "CVE-2021-21227"
file_file_name "Google Chrome"
vulnerabilities_96_cve "CVE-2021-30575"
vulnerabilities_167_score "6.8"
vulnerabilities_74_cve "CVE-2021-30549"
vulnerabilities_125_score "6.8"
vulnerabilities_72_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30547 "
vulnerabilities_118_cve "CVE-2021-30629"
vulnerabilities_49_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30513 "
vulnerabilities_118_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30629 "
vulnerabilities_20_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21190 "
vulnerabilities_31_cve "CVE-2021-21204"
vulnerabilities_8_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21156 "
vulnerabilities_2_score "6.8"
vulnerabilities_98_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30577 "
vulnerabilities_118_score "6.8"
vulnerabilities_48_cve "CVE-2021-30512"
vulnerabilities_4_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21146 "
vulnerabilities_25_score "6.8"
vulnerabilities_156_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38014 "
vulnerabilities_150_score "6.8"
vulnerabilities_139_cve "CVE-2021-37986"
vulnerabilities_38_score "6.8"
vulnerabilities_117_cve "CVE-2021-30628"
vulnerabilities_105_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-30590 "
vulnerabilities_9_score "6.8"
vulnerabilities_49_score "6.8"
vulnerabilities_124_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-37961 "
vulnerabilities_61_score "6.8"
vulnerabilities_123_cve "CVE-2021-37959"
vulnerabilities_41_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21227 "
computer_active "True"
vulnerabilities_101_score "6.8"
vulnerabilities_141_cve "CVE-2021-37988"
vulnerabilities_75_score "6.8"
vulnerabilities_14_score "6.8"
vulnerabilities_140_score "6.8"
vulnerabilities_174_url " https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4079 "
vulnerabilities_42_score "6.8"

5 replies

Forum|alt.badge.img+13

Hi @Mark Rodman
Siemplify platform does not support that. So it's flattening the data to make things easier, but we would love to hear from you what you have to try to accomplish or your specific pain point so we can think about that.


Forum|alt.badge.img+4
  • Author
  • New Member
  • February 3, 2022

I wrote an action and reinflated the data to a JSON structure.


Forum|alt.badge.img+13

Can you please share the exact use case you had to reinflate the event data for?


Forum|alt.badge.img+4
  • Author
  • New Member
  • February 3, 2022

Cisco Secure Endpoint (AMP) data, the event type was Vulnerable Application Detected.


Forum|alt.badge.img+1

Hi @Mark Rodman , it's Tom here from the product management team. I'll contact you in direct message to get more details about your issue