Source Types

9 source types for enrichment, health, threat intel, attack surface, compliance.

Updated April 2026Splunk Integration

Source Types Documentation

Overview

The Whisper Security Add-on produces events with the following source types. All events are written to the index configured in the modular input settings (default: whisper for data events, _internal for operational events).

Source type reference

whisper:enrichment

Enrichment results from the whisperlookup streaming command or the watchlist enrichment input.

PropertyValue
IndexConfigured per input (default: whisper)
Generated bywhisperlookup command, watchlist enrichment input
CIM modelsNetwork Resolution, DNS, Threat Intelligence
CIM tagsnetwork, resolution, dns
Event typewhisper_enrichment

Key fields:

FieldTypeDescription
whisper_ipstringResolved IP address
whisper_asnstringAutonomous System Number
whisper_asn_namestringASN organization name
whisper_countrystringCountry code
whisper_prefixstringIP prefix (CIDR notation)
whisper_threat_scorenumberThreat score (0-100+)
whisper_threat_levelstringNONE / LOW / MEDIUM / HIGH / CRITICAL
vendorstring"Whisper Security" (computed)
vendor_productstring"Whisper Knowledge Graph" (computed)

See the Enrichment page for the full field list (66+ fields).

Example event:

indicator=example.com indicator_type=domain whisper_ip=93.184.216.34 whisper_asn=AS15133 whisper_asn_name="Edgecast Inc." whisper_country=US whisper_threat_level=NONE whisper_threat_score=0

whisper:health

API health check events from the health monitoring modular input.

PropertyValue
Index_internal
Generated byWhisper API Health Check input
CIM models--
CIM tags--
Event typewhisper_health

Key fields:

FieldTypeDescription
statusstringAPI health status: UP or ERROR
node_countnumberTotal nodes in the Knowledge Graph
edge_countnumberTotal edges in the Knowledge Graph
threat_intel_loadedbooleanWhether threat intelligence data is available
feed_source_countnumberNumber of active threat intel feed sources
response_time_msnumberAPI response time in milliseconds

Example event:

status=UP node_count=3671006529 edge_count=30815103317 threat_intel_loaded=true feed_source_count=40 response_time_ms=142

whisper:threat_intel

Threat intelligence collection events from the threat intel modular input.

PropertyValue
Index_internal
Generated byWhisper Threat Intelligence input
CIM modelsThreat Intelligence
CIM tagsthreat, report
Event typewhisper_threat_intel

Key fields:

FieldTypeDescription
indicatorstringIP or domain indicator
indicator_typestringip or domain
threat_scorenumberThreat score from explain API
threat_levelstringNONE / LOW / MEDIUM / HIGH / CRITICAL

whisper:attack_surface

DNS baseline collection events from the DNS baseline modular input.

PropertyValue
IndexConfigured per input (default: whisper)
Generated byWhisper DNS Baseline input, Multi-Tenant Baseline input
CIM modelsNetwork Traffic
CIM tagsnetwork, communicate
Event typewhisper_attack_surface

Key fields:

FieldTypeDescription
domainstringMonitored domain
record_typestringDNS record type: A, NS, MX, CNAME, subdomain
record_valuestringDNS record value
collection_idstringUnique baseline collection identifier
client_idstringTenant identifier (multi-tenant only)

Example event:

domain=example.com record_type=A record_value=93.184.216.34 collection_id=20260401T120000Z

whisper:attack_surface_change

Infrastructure change detection events generated by comparing successive baseline collections.

PropertyValue
IndexConfigured per input (default: whisper)
Generated byWhisper DNS Baseline input (change detection)
CIM modelsChange
CIM tagschange
Event typewhisper_attack_surface_change

Key fields:

FieldTypeDescription
domainstringAffected domain
change_typestringadded or removed
record_typestringDNS record type
old_valuestringPrevious value (for removed)
new_valuestringNew value (for added)
risk_scorenumberCalculated risk score
mitre_attackobjectMITRE ATT&CK technique mapping

Example event:

domain=example.com change_type=added record_type=A new_value=203.0.113.50 risk_score=45

whisper:attack_surface_summary

Collection summary events for multi-tenant baseline runs.

PropertyValue
IndexConfigured per input (default: whisper)
Generated byWhisper Multi-Tenant Baseline input
CIM models--
CIM tags--
Event type--

Key fields:

FieldTypeDescription
client_idstringTenant identifier
domains_processednumberDomains successfully collected
changes_detectednumberTotal changes found
high_priority_changesnumberNS/MX changes (high risk)
elapsed_secondsnumberCollection duration

whisper:watchlist

Pre-computed enrichment events from the watchlist modular input.

PropertyValue
IndexConfigured per input (default: whisper)
Generated byWhisper Watchlist Enrichment input
CIM modelsThreat Intelligence
CIM tagsthreat, report
Event typewhisper_watchlist

Key fields: Same as whisper:enrichment.


whisper:spf_compliance

SPF compliance check results from the compliance query input.

PropertyValue
IndexConfigured per input (default: whisper)
Generated byWhisper Compliance Queries input
CIM models--
CIM tags--
Field aliascollected_at aliased to last_checked

whisper:dnssec_compliance

DNSSEC compliance check results from the compliance query input.

PropertyValue
IndexConfigured per input (default: whisper)
Generated byWhisper Compliance Queries input
CIM models--
CIM tags--
Field aliascollected_at aliased to last_checked

Index mapping

Source typeDefault indexPurpose
whisper:enrichmentwhisperEnrichment results
whisper:health_internalOperational health
whisper:threat_intel_internalThreat intel collection logs
whisper:attack_surfacewhisperDNS baseline data
whisper:attack_surface_changewhisperInfrastructure changes
whisper:attack_surface_summarywhisperMulti-tenant summaries
whisper:watchlistwhisperPre-computed enrichments
whisper:spf_compliancewhisperSPF compliance data
whisper:dnssec_compliancewhisperDNSSEC compliance data
ta_whisper_security_internalTA operational logs (UCC framework)

Tip: All dashboards reference the whisper_index macro (default: index=whisper). Override this macro to use a different index for data events.