Splunk Enterprise Security

How to search Notable Events By Owner and Severity older than 48 hours?

deodeshm
Explorer

As I understand es_notable_events is KVStore and it stores notable event information for last 48 hours/ also there is a panel in ES Audit dashboard that shows Notable Events By Owner - Last 48 Hours.

 

Is there any way to build a similar chart for older Notables?

 

Thanks,

Deovrat

0 Karma

aasabatini
Motivator

Hi @deodeshm 

Also notable events are stored in notable index.

you can see the notable info with this search.

search `notable`  | eval rule_name=if(isnull(rule_name),source,rule_name) | eval rule_title=if(isnull(rule_title),rule_name,rule_title) | `get_urgency` | `risk_correlation` | eval rule_description=if(isnull(rule_description),source,rule_description) | eval security_domain=if(isnull(security_domain),source,security_domain) | expandtoken
“The answer is out there, Neo, and it’s looking for you, and it will find you if you want it to.”
Tags (1)
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...