Fleak OCSF Mapper turns custom and long-tail log sources into clean, OCSF-normalized events inside Splunk — without hand-writing regex, transforms, or field aliases.
Paste a few sample events into the Mapping Studio. Fleak's AI service inspects the structure, generates a parser and an OCSF mapping expression, and lets you preview the result before
deploying. Once a rule is saved, the included | fleakmapping search command streams events through the Zephflow engine and returns standardized OCSF fields, ready for downstream
dashboards, SIEM rules, and security analytics.
Use cases:
- Onboard new vendor or proprietary log formats in minutes instead of weeks
- Normalize firewall, endpoint, identity, and application logs to a shared OCSF schema
- Reduce the regex and transforms toil that slows Splunk ingestion projects
Categories
Security, Fraud & Compliance, SIEM
Resources
Log in to report this app listing