Splunk Enterprise Security

ES why is there a difference in count of Notable alerts vs events in notable index ?

hummingbird81
Explorer

Hello,

Hello, we are on ES 7.3.2. We are noticing there is difference in count of Notable alerts visible under "Incident Review" page versus to the number of events in the notable index for that same time period.

For example, Our Incident Review page when filtered to show all notables for previous month' time range shows 4648 notable alerts generated. Screenshot attached. But, if check index=notable for previous months' time range, it shows 4653 events. Likewise, we are seeing this difference for every month. Ideally both numbers should match.


How to find out what is causing this mismatch and what is the reason exactly?

Labels (1)
Tags (1)
0 Karma

hummingbird81
Explorer

Thanks for responding. Time range is exactly same.  We ended up opening a support case for this. The cause was found to be duplicate events in index=notable for a particular correlation search . What is causing these duplicates is under investigation.

0 Karma

meetmshah
SplunkTrust
SplunkTrust

A couple of things - 

  1. Can you confirm there's no event suppression rule?
  2. Can you confirm the time range are exactly the same and not being rounded off (for example if it's 24 hours, it's same in both and not rounded off)
  3. Can you confirm the result count difference between index=notable VS `notable` (notable macro) and what's the count difference?
0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...