Hi Karthick,
Those entities likely won't map the way you'd like given your analytic rule.
However if you play with your kql you could create a concatenated value and map that to an identifier. (I use strcat frequently)
The other option is to add a log analytics query to your logic app and pull out the 2 fields that way, but I'd do it as in the first suggestion.
Hope that helps.
reference:
strcatfunction
In logicapp when i invoke Microsoft Sentinel Alert the Entites are displayed in below format in am trying get username and devicename
[
{
"$id": "3",
"Name": “randamuser1”,
"Type": "account"
},
{
"$id": "4",
"Name": "randamuser2”,
"Type": "account"
},
{
"$id": "6",
"HostName": “hostofuser1”,
"Type": "host"
},
{
"$id": "7",
"HostName": “hostofuser2,
"Type": "host"
},
]
my expected output is
{
"Name": “randamuser1”,
"HostName": “hostofuser1”
}
{
"Name": "randamuser2”,
"HostName": “hostofuser2,
}
so that i can build a html table in below format
Name hostname
randamuser1 hostofuser1
randamuser2 hostofuser2
If you see the source array data, 1st & 2nd list has Name object but 3rd and 4th doesn't have the Name though have HostName. Could you please confirm if source data is correct?
Yes the values are correct thats how it is being retrieved from Sentinel alert. Image for you reference.
Sign in to comment