Splunk Enterprise Security

How can I view the source index where Splunk Enterprise Security take the event?

New Member

I need to know where i can view the source index of the event that Splunk Enterprise Security take to make an alert, because is showing me that is from risk index.

0 Karma


If you want index to be included as a field in the incident itself, you could add "index" as an incident review event attribute.

Configure > Incident Management > Incident Review Settings > Incident Review - Event Attributes

For this to work you would also have to make sure that the index field is included in the output of your correlation searches as well. This would require edits to a lot of the out-of-the-box correlation searches that use the tstats command on data models.

0 Karma


It depends. Often alerts are fired based on the output correlation searches and these are usually baked by data models.

The easiest way would be to check if your incident review event has shows something like the original sourcetype. From there you should find the source index relatively quickly.

Another option would be to check the actual SPL in the given correlation search in each incident review event. You'll see, which datamodel/s is/are used to get the data from. From here, you could either look for the specific datamodels in your

Enterprise Security -> Configuration -> CIM Setup

or in

Global Settings -> Advanced Search -> Search Macros -> cim_[Datamodel]_indexes



0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...