Hi,
I am using Splunk v 5.0.5 with ES App 2.4.1. There are some correlation rules whose results show only timestamp as an event. When I click on create a report, a count field comes up but as such there is no other information. Some such correlation rules are Watchlisted Events,Personally Identifiable Information Detected.
Please suggest as to what exactly is happening when these searches run.
hi,
that usually indicates a customized search that isn't using the get_event_id
| map_notable_fields
macros -- http://docs.splunk.com/Documentation/ES/2.4.1/Install/ModifyCorrelationSearches#Create_a_correlation...
alternatively, you might be false positive matching against events that just don't make any sense.
hi,
that usually indicates a customized search that isn't using the get_event_id
| map_notable_fields
macros -- http://docs.splunk.com/Documentation/ES/2.4.1/Install/ModifyCorrelationSearches#Create_a_correlation...
alternatively, you might be false positive matching against events that just don't make any sense.