I'd like to create a filter for a notable event but the field that I'm trying to filter against doesn't show up in the notable index for a particular correlation search. How would one go about making this possible?
For example, in the correlation search: "Network - SANS Block List Activity - Rule", I'd like to filter out any of this activity that gets blocked at the firewall, but still have the ability to report on it outside the notable events/incident review dashboard, using the notable index of course. i.e. for all results found in the the SANS Block List correlation search, if the action equals deny or blocked, mark the event as filtered. The problem that I'm running into is that the firewall event 'Action=' is not available as a field in the notable index for that search. I can also apply this methodology as a false-positive tuning tactic that can be applied to many other correlation searches as well, so knowing how to do this effectively could help trim out a lot of noise on the Notable Events and Incident Review dashboard. Of course, I welcome any guidance on other ways this can be handled as well.
As you've noted the action's not in the index; there's some options we're considering here but it's not a one-size-fits-all answer yet. Ping me an email at jcoates @splunk.com and we can discuss in more detail what you're seeing.