<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating a notable event from correlation search in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129019#M359</link>
    <description>&lt;P&gt;I created the notable events in the Configure==&amp;gt; Incident events as well. Still unable to see the contributing events in incidents. &lt;/P&gt;</description>
    <pubDate>Thu, 22 Nov 2018 16:50:08 GMT</pubDate>
    <dc:creator>kamal_jagga</dc:creator>
    <dc:date>2018-11-22T16:50:08Z</dc:date>
    <item>
      <title>Creating a notable event from correlation search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129016#M356</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt;
Im using the below search and wish to create a notable event from the search. (filtered to not show company info)&lt;/P&gt;

&lt;P&gt;sourcetype=DhcpSrvLog description=assign dest!=prefix1* prefix2* dest_ip!=x.x.x.x/20 dest_ip!=x.x.x.x/21 | rex mode=sed field=dest "s/.companydomain.com//g" | where dest!=dest_mac | table dest,dest_ip,dest_mac,time,date | sort date&lt;/P&gt;

&lt;P&gt;When I search manually over last 24 hours I get results, however no notable events are created. Does the correlation search syntax need to be in a certain format to generate the notable event?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 20:05:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129016#M356</guid>
      <dc:creator>shiftey</dc:creator>
      <dc:date>2020-09-28T20:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a notable event from correlation search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129017#M357</link>
      <description>&lt;P&gt;The correlation search does need to be in a particular format (needs to make an event in the notable index and have particular fields). I suggest using the Correlation Search Editor to make it (Configuration » Custom Searches) since it will handle the particulars for you. Make sure to enable the "Create notable event" action so that the search creates a notable event for you.&lt;/P&gt;</description>
      <pubDate>Thu, 28 May 2015 03:37:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129017#M357</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-05-28T03:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a notable event from correlation search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129018#M358</link>
      <description>&lt;P&gt;Hi Luke,&lt;/P&gt;

&lt;P&gt;I am also trying to create some custom correlation searches and notables from my daily reports. &lt;/P&gt;

&lt;P&gt;Steps I followed to make this:&lt;BR /&gt;
1. In ES ==&amp;gt; ES ==&amp;gt; Configure ==&amp;gt; Content Mgmt ==&amp;gt; Create New Content ==&amp;gt; Correlation Searches&lt;BR /&gt;
2. While creating the correlation searches, I added the name of the new notable (assuming that this would create new notable) and scheduled and saved it.&lt;/P&gt;

&lt;P&gt;The query runs fine and gives the output in tabular format. Its creating  the notables but I am not able to see the contributing events/error event.&lt;/P&gt;

&lt;P&gt;As you mentioned above, could you advise on the format needed to make an event in the notable index and have particular fields.&lt;/P&gt;

&lt;P&gt;Also, I am unable to find  Correlation Search Editor to make it (Configuration » Custom Searches) &lt;/P&gt;

&lt;P&gt;Kindly advise.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Nov 2018 00:44:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129018#M358</guid>
      <dc:creator>kamal_jagga</dc:creator>
      <dc:date>2018-11-21T00:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a notable event from correlation search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129019#M359</link>
      <description>&lt;P&gt;I created the notable events in the Configure==&amp;gt; Incident events as well. Still unable to see the contributing events in incidents. &lt;/P&gt;</description>
      <pubDate>Thu, 22 Nov 2018 16:50:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129019#M359</guid>
      <dc:creator>kamal_jagga</dc:creator>
      <dc:date>2018-11-22T16:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a notable event from correlation search</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129020#M360</link>
      <description>&lt;P&gt;I hadn't named the Drill-down search while creating the notable. Once it was updated, the contributing events started showing up as expected.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 21:43:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Creating-a-notable-event-from-correlation-search/m-p/129020#M360</guid>
      <dc:creator>kamal_jagga</dc:creator>
      <dc:date>2019-01-06T21:43:45Z</dc:date>
    </item>
  </channel>
</rss>

