Splunk Enterprise Security

Is there a way to add searchable splunk Notable Event metadata ?

daniel333
Builder

All,

I though it would be nice for PCI guy to search the top right by PCI DSS req, say like "10.1" its working for views. But is there a way to put a DSS req number into an notable event to make it searchable other than the name of the alert itself?

David_Naylor
Path Finder

Create a new field using eval and list it along with the other fields you care about in a table

|notablegeneratingsearch
|eval pci_id="10.1"
|table pci_id,alltheotherfieldsyoucareabout

Alternatively could use the tag field.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...