<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to get (or generate) Splunk ES notable event titles as seen on Incident Review dashboard in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332215#M3114</link>
    <description>&lt;P&gt;Researching this exact problem and stumbled upon something that may help future searchers..&lt;/P&gt;

&lt;P&gt;expandtoken command, new for ES 5&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/ES/5.0.0/Admin/Expandtoken"&gt;http://docs.splunk.com/Documentation/ES/5.0.0/Admin/Expandtoken&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Mar 2018 17:45:47 GMT</pubDate>
    <dc:creator>smeier</dc:creator>
    <dc:date>2018-03-07T17:45:47Z</dc:date>
    <item>
      <title>How to get (or generate) Splunk ES notable event titles as seen on Incident Review dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332211#M3110</link>
      <description>&lt;P&gt;I would like to create a dashboard that displays notable event titles as seen on the Incident Review dashboard. Is there an easy way to take the rule_title that is available via the "notable" macro and show token values?&lt;/P&gt;

&lt;P&gt;For example, the rule_title from notable macro will show a value such as: "Bad thing by $src_ip$"&lt;/P&gt;

&lt;P&gt;But the value I really want to show is: "Bad thing by 192.168.1.1"&lt;/P&gt;

&lt;P&gt;I understand that Splunk is probably not storing the latter anywhere (at least not anywhere I can find), but how could I get Splunk to show the value of the token in the same field?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:21:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332211#M3110</guid>
      <dc:creator>laleger</dc:creator>
      <dc:date>2020-09-29T14:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to get (or generate) Splunk ES notable event titles as seen on Incident Review dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332212#M3111</link>
      <description>&lt;P&gt;martin_mueller posted a way to do this using macros, but I used a custom search command to do variable replacement.&lt;/P&gt;

&lt;P&gt;Oops, I meant to post this as a comment.  This is certainly not an answer.&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 19:34:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332212#M3111</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2017-05-31T19:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to get (or generate) Splunk ES notable event titles as seen on Incident Review dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332213#M3112</link>
      <description>&lt;P&gt;My custom search command (very quickly done during an evaluation, so it's up to you to sanity check it):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;from splunklib.searchcommands import \
    dispatch, StreamingCommand, Configuration, Option, validators
import sys
from string import Template

class MyTemplate(Template):
    pattern = r'\$(?P&amp;lt;named&amp;gt;[^$]+)\$'

@Configuration(local=True)
class TemplateCommand(StreamingCommand):
    def stream(self, records):
        for record in records:
            for fieldname in self.fieldnames:
                template = MyTemplate(record[fieldname])
                substituted = template.safe_substitute(record)
                record[fieldname] = substituted
            yield record

dispatch(TemplateCommand, sys.argv, sys.stdin, sys.stdout, __name__)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The command would be run like this (I think):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;notable search&amp;gt; | template src_ip dest_ip &amp;lt;...&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 31 May 2017 20:00:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332213#M3112</guid>
      <dc:creator>micahkemp</dc:creator>
      <dc:date>2017-05-31T20:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: How to get (or generate) Splunk ES notable event titles as seen on Incident Review dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332214#M3113</link>
      <description>&lt;P&gt;I was hoping that I wouldn't have to go this route, but looks like this is definitely a possible solution. Do you recall the URL/title for the post from martin_mueller? I couldn't find it.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Jun 2017 18:04:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332214#M3113</guid>
      <dc:creator>laleger</dc:creator>
      <dc:date>2017-06-02T18:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to get (or generate) Splunk ES notable event titles as seen on Incident Review dashboard</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332215#M3114</link>
      <description>&lt;P&gt;Researching this exact problem and stumbled upon something that may help future searchers..&lt;/P&gt;

&lt;P&gt;expandtoken command, new for ES 5&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/ES/5.0.0/Admin/Expandtoken"&gt;http://docs.splunk.com/Documentation/ES/5.0.0/Admin/Expandtoken&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Mar 2018 17:45:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-get-or-generate-Splunk-ES-notable-event-titles-as-seen-on/m-p/332215#M3114</guid>
      <dc:creator>smeier</dc:creator>
      <dc:date>2018-03-07T17:45:47Z</dc:date>
    </item>
  </channel>
</rss>

