Splunk Enterprise Security

How can I view the source index where Splunk Enterprise Security take the event?

New Member

I need to know where i can view the source index of the event that Splunk Enterprise Security take to make an alert, because is showing me that is from risk index.

0 Karma


If you want index to be included as a field in the incident itself, you could add "index" as an incident review event attribute.

Configure > Incident Management > Incident Review Settings > Incident Review - Event Attributes

For this to work you would also have to make sure that the index field is included in the output of your correlation searches as well. This would require edits to a lot of the out-of-the-box correlation searches that use the tstats command on data models.

0 Karma


It depends. Often alerts are fired based on the output correlation searches and these are usually baked by data models.

The easiest way would be to check if your incident review event has shows something like the original sourcetype. From there you should find the source index relatively quickly.

Another option would be to check the actual SPL in the given correlation search in each incident review event. You'll see, which datamodel/s is/are used to get the data from. From here, you could either look for the specific datamodels in your

Enterprise Security -> Configuration -> CIM Setup

or in

Global Settings -> Advanced Search -> Search Macros -> cim_[Datamodel]_indexes



0 Karma
Get Updates on the Splunk Community!

.conf23 Registration is Now Open!

Time to toss the .conf-etti 🎉 —  .conf23 registration is open!   Join us in Las Vegas July 17-20 for ...

Don't wait! Accept the Mission Possible: Splunk Adoption Challenge Now and Win ...

Attention everyone! We have exciting news to share! We are recruiting new members for the Mission Possible: ...

Unify Your SecOps with Splunk Mission Control

In today’s post, I'm excited to share some recent Splunk Mission Control innovations. With Splunk Mission ...