<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise Security passing fields in notable settings in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687999#M114598</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267362"&gt;@splunky_diamond&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;probably this isn't the issue, but why do you use quotes?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=fudo_index completed_action="deleted session."
| stats 
     values(node_address) AS address 
     values(user) AS user 
     values(fudo_session) AS session 
     values(completed_action) AS "completed action" 
     count(completed_action) AS counter
| where counter&amp;gt;0&lt;/LI-CODE&gt;&lt;P&gt;quots are mandatory when you have spaces or special chars in the field names.&lt;/P&gt;&lt;P&gt;Then, why don't you use an aggregation key (the BY clause)?&lt;/P&gt;&lt;P&gt;I'd try with something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=fudo_index completed_action="deleted session."
| stats 
     values(user) AS user 
     values(fudo_session) AS session 
     values(completed_action) AS "completed action" 
     count(completed_action) AS counter
     BY node_address
| where counter&amp;gt;0
| rename node_address AS address&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Mon, 20 May 2024 09:41:08 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-05-20T09:41:08Z</dc:date>
    <item>
      <title>Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687985#M114594</link>
      <description>&lt;P&gt;Hello Splunkers!&lt;BR /&gt;&lt;BR /&gt;I have built my own correlation search:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunky_diamond_0-1716182599645.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/30869iC368B5CDFFA3AE63/image-size/medium?v=v2&amp;amp;px=400" role="button" title="splunky_diamond_0-1716182599645.png" alt="splunky_diamond_0-1716182599645.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From which I am generating a notable. In that notable I want to pass some fields using the $&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunky_diamond_1-1716182670751.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/30870i3763ADFD54318DA8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="splunky_diamond_1-1716182670751.png" alt="splunky_diamond_1-1716182670751.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I saw this trick of passing the fields like $this$ in some other pre-configured correlation searches in Enterprise Security, but in my own correlation search it does not work for some reason:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunky_diamond_2-1716182815413.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/30871i8B268E12F84779D4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="splunky_diamond_2-1716182815413.png" alt="splunky_diamond_2-1716182815413.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please tell me how can I make it work? Let me know if you want me to share some other configurations that I did, that might be relevant to this issue.&lt;BR /&gt;&lt;BR /&gt;Thanks for taking your time reading and replying to my post &lt;span class="lia-unicode-emoji" title=":red_heart:"&gt;❤️&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 05:28:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687985#M114594</guid>
      <dc:creator>splunky_diamond</dc:creator>
      <dc:date>2024-05-20T05:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687990#M114596</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267362"&gt;@splunky_diamond&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I suppose that You are confusing passing some Correlation Search fields in the title of the CS itself (using a token) with the fields to display in an Incident review.&lt;BR /&gt;The example you gave is of the first type, but, if I correctly understand, you want to display other fields in the Notable information.&lt;BR /&gt;to do this you must add these fields to the Correlation Search results (e.g. as values in the stats command), so that they are written in the Notable event and then, go to [Configure &amp;gt; Incident Review&amp;gt;Incident Settings] and add these fields to those displayed (if they were not already present).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 06:14:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687990#M114596</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-05-20T06:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687998#M114597</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;, I tried your suggestion, it worked for the "fudo_session" field, thank you!&lt;/P&gt;&lt;P&gt;However, I tried the same on "dvc" field and it does not work for some reason...&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I tried extracting new field called "node_address" and added it to my search in the following way:&lt;BR /&gt;&lt;BR /&gt;index=fudo_index completed_action="deleted session."&lt;BR /&gt;| stats &lt;STRONG&gt;values("node_address") as address&lt;/STRONG&gt; values("user") as user values("fudo_session") as session values("completed_action") as "completed action" count("completed_action") as counter&lt;BR /&gt;| where 'counter'&amp;gt;0&lt;BR /&gt;&lt;BR /&gt;And in the title of the notable I have the following:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Deleted recorded session $session$ detected on $address$&lt;BR /&gt;&lt;BR /&gt;Also I added both fields in the incident review settings as you said.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Here is the result:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunky_diamond_0-1716196657657.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/30873iBE9DAD7507F8D571/image-size/medium?v=v2&amp;amp;px=400" role="button" title="splunky_diamond_0-1716196657657.png" alt="splunky_diamond_0-1716196657657.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The value that should appear instead of "$address$" is the IPv4 address. When I was extracting the field node_address, I did it in the enterprise security app in the search. For the permissions I made it global with everyone being able to read and only admin with write permissions (just like fudo_session field).&lt;BR /&gt;&lt;BR /&gt;If both of them are completely identical, why isn't this field getting evaluated like fudo_session? Could you please help with troubleshooting this?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 09:20:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687998#M114597</guid>
      <dc:creator>splunky_diamond</dc:creator>
      <dc:date>2024-05-20T09:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687999#M114598</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267362"&gt;@splunky_diamond&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;probably this isn't the issue, but why do you use quotes?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=fudo_index completed_action="deleted session."
| stats 
     values(node_address) AS address 
     values(user) AS user 
     values(fudo_session) AS session 
     values(completed_action) AS "completed action" 
     count(completed_action) AS counter
| where counter&amp;gt;0&lt;/LI-CODE&gt;&lt;P&gt;quots are mandatory when you have spaces or special chars in the field names.&lt;/P&gt;&lt;P&gt;Then, why don't you use an aggregation key (the BY clause)?&lt;/P&gt;&lt;P&gt;I'd try with something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=fudo_index completed_action="deleted session."
| stats 
     values(user) AS user 
     values(fudo_session) AS session 
     values(completed_action) AS "completed action" 
     count(completed_action) AS counter
     BY node_address
| where counter&amp;gt;0
| rename node_address AS address&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 09:41:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/687999#M114598</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-05-20T09:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688000#M114599</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;, I used quotes when I was trying different cases, with hope that maybe adding them might somehow solve my problem, haha!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Anyways, I tried the last search that you provided :&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=fudo_index completed_action="deleted session." | stats values(user) AS user values(fudo_session) AS session values(completed_action) AS "completed action" count(completed_action) AS counter BY node_address | where counter&amp;gt;0 | rename node_address AS address&lt;/LI-CODE&gt;
&lt;P&gt;Unfortunately, it didn't help the situation. the $address$ is still not resolved. By the way, it does not matter whether I try with this new field that I extracted, or if I try with the $dest$ or $dvc$ that were parsed in my logs from the beginning, for some reason neither of them resolve in the notable title &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Do you have any other ideas what I can check in order to solve my issue?&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;splunky_diamond&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 10:04:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688000#M114599</guid>
      <dc:creator>splunky_diamond</dc:creator>
      <dc:date>2024-05-20T10:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688003#M114600</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267362"&gt;@splunky_diamond&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;dest and dvc aren't in the Correlation Search, so it's correct.&lt;/P&gt;&lt;P&gt;Instead, address, shouldbe displayed.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 10:37:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688003#M114600</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-05-20T10:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688115#M114611</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Update: it actually did work! I just got new notable generated and the field value passed successfully!&lt;BR /&gt;Thank you very much!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 06:42:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688115#M114611</guid>
      <dc:creator>splunky_diamond</dc:creator>
      <dc:date>2024-05-21T06:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise Security passing fields in notable settings</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688117#M114612</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/267362"&gt;@splunky_diamond&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2024 06:49:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-Security-passing-fields-in-notable-settings/m-p/688117#M114612</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-05-21T06:49:26Z</dc:date>
    </item>
  </channel>
</rss>

