Hello, I have an issue where we ingest a JSON type log which has
multivalue key pairs. <132>1 2024-10-08T23:36:16.523272Z
a347p001con61.itp.extra pam.rgt.gouv.qc.ca NILVALUE NILVALUE -
{"adf":true,"significant":0,"udf":false,"virtualservice":"virtual...
Thank you so much! This worked perfectly, I have created a second parser
to analyse the split log in order to facilitate readability. >>Can you
tell me a little about the log source / product api you are retrieving
the logs from?These are logs coming...
Based on the above log, what would be the best way to map these
attributes? The following is a snippet of what I've done, it works to
identify the logs and I can define a type based on the significant_log
using regex and use to change , but I can't s...
Checkpoint verifies that both units have the same "HA Group" "HA ID" and
"HA Password" and if they are set in A-P and both are primary, then it
logs and sends an alert. I've used Fortinet terms for this in order to
make sense to those who read this f...