I am pretty new to SecOps custom parser.
I was able to write a parser extension for a Syslog product,
but now I have to create a completely new custom parser, the logs arrive in JSON format.
Can someone help me with some example code?
LOGS:
{
"customerId": "obfuscated",
"events": [
{
"metadata": {
"eventTimestamp": "2025-10-29T16:17:30.954000+00:00",
"eventType": "GENERIC_EVENT"
},
"additional": {
"severity": "DEBUG",
"message": "SUCCESS - Authorization Code Generated"
}
},
{
"metadata": {
"eventTimestamp": "2025-10-29T16:17:28.916000+00:00",
"eventType": "GENERIC_EVENT"
},
"additional": {
"severity": "DEBUG",
"message": "SUCCESS - device ownership and compliance check"
}
},
{
"metadata": {
"eventTimestamp": "2025-10-29T16:17:28.181000+00:00",
"eventType": "GENERIC_EVENT"
},
"additional": {
"severity": "DEBUG",
"message": "SUCCESS - Authorization Code Generated"
}
},
{
"metadata": {
"eventTimestamp": "2025-10-29T16:17:11.489000+00:00",
"eventType": "GENERIC_EVENT"
},
"additional": {
"severity": "DEBUG",
"message": "SUCCESS - device ownership and compliance check"
}
},
{
"metadata": {
"eventTimestamp": "2025-10-29T16:17:10.618000+00:00",
"eventType": "GENERIC_EVENT"
},
"additional": {
"severity": "DEBUG",
"message": "SUCCESS - certificate is not revoked"
}
},
{
"metadata": {
"eventTimestamp": "2025-10-29T16:17:03.929000+00:00",
"eventType": "GENERIC_EVENT"
},
"additional": {
"severity": "INFO",
"message": "Trustscore calculated"
}
}
]
}
