Splunk Enterprise Security

Is there a way to add searchable splunk Notable Event metadata ?

daniel333
Builder

All,

I though it would be nice for PCI guy to search the top right by PCI DSS req, say like "10.1" its working for views. But is there a way to put a DSS req number into an notable event to make it searchable other than the name of the alert itself?

David_Naylor
Path Finder

Create a new field using eval and list it along with the other fields you care about in a table

|notablegeneratingsearch
|eval pci_id="10.1"
|table pci_id,alltheotherfieldsyoucareabout

Alternatively could use the tag field.

0 Karma
Get Updates on the Splunk Community!

Reduce and Transform Your Firewall Data with Splunk Data Management

Managing high-volume firewall data has always been a challenge. Noisy events and verbose traffic logs often ...

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...