I can find correlation searches created notable events:
01-20-2019 00:01:29.782 -0500 INFO sendmodalert - Invoking modular alert action=notable for search="Asset - Asset Ownership Unspecified - Rule" sid="scheduler__admin_U0EtSWRlbnRpdHlNYW5hZ2VtZW50__RMD5adc793953e142031_at_1547960400_9000" in app="SA-IdentityManagement" owner="admin" type="saved"
01-20-2019 04:04:14.870 -0500 INFO sendmodalert - Invoking modular alert action=notable for search="Access - Account Deleted - Rule" sid="rt_scheduler__admin_U0EtQWNjZXNzUHJvdGVjdGlvbg__RMD5eaf4137ed4b67244_at_1547974933_12088.1" in app="SA-AccessProtection" owner="admin" type="saved"
By searching "index=notable", I can see notable events but nothing found in incident review dashboard.
You might have suppressed your notable events.
Please go ES app -> Configure -> Incident Management -> "Notable Event Suppressions"
Check if any suppressions set.
Here is the answer you can refer to:
https://answers.splunk.com/answers/73722/is-there-an-easy-way-to-close-out-150k-incident-events.html
You might have suppressed your notable events.
Please go ES app -> Configure -> Incident Management -> "Notable Event Suppressions"
Check if any suppressions set.
Here is the answer you can refer to:
https://answers.splunk.com/answers/73722/is-there-an-easy-way-to-close-out-150k-incident-events.html