Use case: Create a report that uses Event Data that is not Normalized
You can use a custom property to extract data that is not normalized from a payload, and use that data to build a report. For example, you can build a report that is based on the interface information that is in Cisco ASA firewall deny messages.
In this example, we'll use the following sample Cisco ASA firewall events to demonstrate how to extract the interface value from the event payload, and then build a report that uses that data.
<162>Sep 02 2014 11:49:41: %ASA-2-106001: Inbound TCP connection denied from 10.10.10.128/58826 to 10.11.11.11/9100 flags SYN on interface External <162>Sep 02 2014 11:49:40: %ASA-2-106001: Inbound TCP connection denied from 10.10.10.128/58826 to 10.11.11.11/9100 flags SYN on interface Loopback <162>Sep 02 2014 11:49:17: %ASA-2-106001: Inbound TCP connection denied from 10.10.10.128/58821 to 10.11.11.11/9100 flags SYN on interface Internal