Splunk Enterprise Security

Is there a way to add searchable splunk Notable Event metadata ?

daniel333
Builder

All,

I though it would be nice for PCI guy to search the top right by PCI DSS req, say like "10.1" its working for views. But is there a way to put a DSS req number into an notable event to make it searchable other than the name of the alert itself?

David_Naylor
Path Finder

Create a new field using eval and list it along with the other fields you care about in a table

|notablegeneratingsearch
|eval pci_id="10.1"
|table pci_id,alltheotherfieldsyoucareabout

Alternatively could use the tag field.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...