<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access Finding/Investigation notes in ES 8 in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/755750#M12762</link>
    <description>&lt;P&gt;I got an other approach.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that this update events are getting stored into the audit trail .&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you can find the content of the notes with the search:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index="_audit" source=mc_notes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Nov 2025 08:06:11 GMT</pubDate>
    <dc:creator>Christopherscha</dc:creator>
    <dc:date>2025-11-21T08:06:11Z</dc:date>
    <item>
      <title>Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/744169#M12480</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;we're currently migrating to ES 8 and need to see Work Notes (comments) provided by analysts in some dashboards/reports. Previously, the incident_updates_lookup contained the "comment" field, which held this information, and was easy to access in a search.&lt;BR /&gt;&lt;BR /&gt;With ES 8, this was obviously mentioned as a limitation - "&lt;SPAN&gt;The&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Comments&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;feature available in prior versions of Splunk Enterprise Security is now replaced by an enhanced capability to add notes."&lt;BR /&gt;&lt;BR /&gt;How can we access those notes (KV Store/Lookup/...) outside of having to click through the Mission Control/Analyst Queue manually? Where are they stored?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 10:37:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/744169#M12480</guid>
      <dc:creator>ljvc</dc:creator>
      <dc:date>2025-04-15T10:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/744174#M12481</link>
      <description>&lt;P&gt;As usual, I figured it out shortly after finally asking.&lt;BR /&gt;Notes are kept in the mc_notes collection in the missioncontrol app, if anyone else was wondering...&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2025 12:04:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/744174#M12481</guid>
      <dc:creator>ljvc</dc:creator>
      <dc:date>2025-04-15T12:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/745987#M12518</link>
      <description>&lt;P&gt;Good afternoon &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250651"&gt;@ljvc&lt;/a&gt;. Could you provide some direction on how you're accessing the mc_notes collection from within the Mission Control app? Struggling to find this.&lt;/P&gt;</description>
      <pubDate>Mon, 12 May 2025 18:51:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/745987#M12518</guid>
      <dc:creator>randoj</dc:creator>
      <dc:date>2025-05-12T18:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746021#M12520</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227672"&gt;@randoj&lt;/a&gt;&amp;nbsp;!&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We just created a lookup definition manually in a local/transforms.conf, as you would with any other KV Store lookup.&lt;BR /&gt;Additionally, we needed to do the same for the mc_incidents collection, as it is needed to correlate notable_ids and incident_ids, the latter of which are used in mc_notes.&lt;/P&gt;&lt;P&gt;It probably is easier to access the collections using the Python SDK and scripts, but this solution worked for us and required less setup.&lt;BR /&gt;&lt;BR /&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 07:04:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746021#M12520</guid>
      <dc:creator>ljvc</dc:creator>
      <dc:date>2025-05-13T07:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746085#M12522</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250651"&gt;@ljvc&lt;/a&gt;&amp;nbsp;I appreciate the information, this is helpful. Would you be able to share your transforms.conf files against the mc_incidents and mc_notes collections? I'd like to better understand how that correlation with incident_id is happening between the collections and dumping it into something readable in a lookup.&lt;/P&gt;</description>
      <pubDate>Tue, 13 May 2025 18:40:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746085#M12522</guid>
      <dc:creator>randoj</dc:creator>
      <dc:date>2025-05-13T18:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746156#M12523</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227672"&gt;@randoj&lt;/a&gt;&amp;nbsp;unfortunately, I cannot share the exact files. However, you should be able to get the incident id for each finding using its calculated rule_id (compare the eval statement for rule_id/event_id in [Incident Review - Main] in SA-ThreatIntelligence/default/savedsearches.conf) via the mc_incidents collection, which has a field notable_id iirc. Then, use that id as a key against the mc_notes collection, and you can get notes for findings. Hope this clears things up a bit!&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 06:46:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746156#M12523</guid>
      <dc:creator>ljvc</dc:creator>
      <dc:date>2025-05-14T06:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746188#M12524</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250651"&gt;@ljvc&lt;/a&gt;&amp;nbsp;I appreciate the information you were able to provide, this is helpful. On a side note I do have an active case open with Splunk support on this topic. Their latest update was that this has been a reported issue, and that they expect it to be addressed in ES 8.2 per an internal JIRA ticket.&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 13:29:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/746188#M12524</guid>
      <dc:creator>randoj</dc:creator>
      <dc:date>2025-05-14T13:29:57Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/748041#M12550</link>
      <description>&lt;P&gt;Download Splunk App for Lookup File Editing app. Nn Lookups menu, select All and search for mc_notes. On Actions menu, click the magnifier button to search the mc_notes lookup. A prompt will show up asking you to create a lookup transform. Add the name that you want and click Create transform.&lt;/P&gt;&lt;P&gt;Open a new search and search&amp;nbsp;| inputlookup mc_notes to show mv_notes content.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Jun 2025 20:47:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/748041#M12550</guid>
      <dc:creator>adrezende_splun</dc:creator>
      <dc:date>2025-06-16T20:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/749718#M12584</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following up on the above discussion, has anyone else discovered that there are quite a few instances where the "incident_id" field is blank in the mc_notes lookup?&lt;BR /&gt;The other fields (autor.username, create_time and content) contain the correct information but there is nothing in incident_id.&lt;/P&gt;&lt;P&gt;Makes it a bit difficult to match the note to the corresponding incident &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2025 09:47:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/749718#M12584</guid>
      <dc:creator>hcpr</dc:creator>
      <dc:date>2025-07-14T09:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/749725#M12585</link>
      <description>&lt;P&gt;Hello hcpr,&lt;/P&gt;&lt;P&gt;we did run into the same issue shortly after my previous post, and I forgot to give an update in here.&lt;/P&gt;&lt;P&gt;The app "missioncontrol" exposes a few endpoints to do with incidents and investigations, and tracing the behavior of Enterprise Security when fetching comments led us to its OpenAPI spec which you can find at missioncontrol/mcopenapi.yaml.&lt;/P&gt;&lt;P&gt;The incidents endpoint, when fed a finding/notable ID, will return a list of comments. I recommend everyone to take a look at the requests in your browser's developer tools when interacting with finding notes on the Analyst Queue to see how the endpoint works. Ultimately, we went that way and implemented a custom command to perform the same requests at search time. This is now working flawlessly for us so far, getting even those notes which have no incident_id or source in mc_notes.&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jul 2025 10:49:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/749725#M12585</guid>
      <dc:creator>ljvc</dc:creator>
      <dc:date>2025-07-14T10:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/755750#M12762</link>
      <description>&lt;P&gt;I got an other approach.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that this update events are getting stored into the audit trail .&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you can find the content of the notes with the search:&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;index="_audit" source=mc_notes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2025 08:06:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/755750#M12762</guid>
      <dc:creator>Christopherscha</dc:creator>
      <dc:date>2025-11-21T08:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/758466#M12845</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for your help in solving this issue. Here is my solution :&lt;/P&gt;&lt;P&gt;Create the lookup definition in missioncontrol/local/&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt; for mc_notes :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[mc_notes_lookup]
collection = mc_notes
external_type = kvstore
fields_list = ai_generated,content,create_time,files,incident_id,last_edited_by,source,source_type,title,update_time,_key&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Comments can then be corelated with notables :&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;`notable`
|eval `get_event_id_meval`,rule_id=event_id
|lookup mc_findings_lookup notable_id AS event_id OUTPUT _key AS incident_id
|lookup mc_notes_lookup incident_id OUTPUT content AS comment&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 14:37:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/758466#M12845</guid>
      <dc:creator>joelschaerhk</dc:creator>
      <dc:date>2026-02-18T14:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/759256#M12865</link>
      <description>&lt;P&gt;For some reason as I see in case of updates of the old events Splunk writes the change into the _audit index. You can access to it by this search&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_audit source=mc_notes 
| rex "(?&amp;lt;timestamp&amp;gt;[\d.]+),(?&amp;lt;incident_id&amp;gt;[\w-]+),(?&amp;lt;user&amp;gt;[\w_]+),(?&amp;lt;model&amp;gt;[\w]+),(?&amp;lt;command&amp;gt;[\w]+),(?&amp;lt;diff&amp;gt;.+)" 
| eval time=_time 
| table time, user, incident_id, diff, command 
| rex field=diff mode=sed "s/\\\\//g" 
| rex field=diff mode=sed "s/^\"//g" 
| rex field=diff mode=sed "s/\"$//g" 
| spath input=diff&lt;/LI-CODE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Thu, 12 Mar 2026 18:10:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/759256#M12865</guid>
      <dc:creator>TamasDubicz</dc:creator>
      <dc:date>2026-03-12T18:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/760008#M12884</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/250651"&gt;@ljvc&lt;/a&gt;&amp;nbsp;are you able to share any more details on your solution? Struggling to figure out how to get all the comments in a single report. thanks in advance!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 07:56:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/760008#M12884</guid>
      <dc:creator>swalker</dc:creator>
      <dc:date>2026-04-08T07:56:40Z</dc:date>
    </item>
    <item>
      <title>Re: Access Finding/Investigation notes in ES 8</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/760011#M12885</link>
      <description>&lt;P&gt;Hi there! We ultimately implemented a custom command to query the missioncontrol API based on the event_id for each finding. This returns all relevant notes. You can use the usual service object the custom command classes provide to formulate GET requests to the ES API using its service.get() function while passign along information from each event you're looking to report on.&lt;/P&gt;&lt;P&gt;As mentioned above, the best way to understand the necessary requests is to just follow along with the requests contents when using the ES UI with your browser, in addition to the documentation in the missioncontrol app. For custom commands and the service object, check the custom command examples in splunk dev and the splunk SDK documentation respectively.&lt;/P&gt;&lt;P&gt;Hope this helps, best of luck with your implementation!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 08:12:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Access-Finding-Investigation-notes-in-ES-8/m-p/760011#M12885</guid>
      <dc:creator>ljvc</dc:creator>
      <dc:date>2026-04-08T08:12:41Z</dc:date>
    </item>
  </channel>
</rss>

