Splunk Enterprise Security

How can I view the source index where Splunk Enterprise Security take the event?

New Member

I need to know where i can view the source index of the event that Splunk Enterprise Security take to make an alert, because is showing me that is from risk index.

0 Karma


If you want index to be included as a field in the incident itself, you could add "index" as an incident review event attribute.

Configure > Incident Management > Incident Review Settings > Incident Review - Event Attributes

For this to work you would also have to make sure that the index field is included in the output of your correlation searches as well. This would require edits to a lot of the out-of-the-box correlation searches that use the tstats command on data models.

0 Karma


It depends. Often alerts are fired based on the output correlation searches and these are usually baked by data models.

The easiest way would be to check if your incident review event has shows something like the original sourcetype. From there you should find the source index relatively quickly.

Another option would be to check the actual SPL in the given correlation search in each incident review event. You'll see, which datamodel/s is/are used to get the data from. From here, you could either look for the specific datamodels in your

Enterprise Security -> Configuration -> CIM Setup

or in

Global Settings -> Advanced Search -> Search Macros -> cim_[Datamodel]_indexes



0 Karma
Get Updates on the Splunk Community!

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...

Observability Newsletter Highlights | March 2023

 March 2023 | Check out the latest and greatestSplunk APM's New Tag Filter ExperienceSplunk APM has updated ...

Security Newsletter Updates | March 2023

 March 2023 | Check out the latest and greatestUnify Your Security Operations with Splunk Mission Control The ...