Splunk Enterprise Security

Is there a way to add searchable splunk Notable Event metadata ?

daniel333
Builder

All,

I though it would be nice for PCI guy to search the top right by PCI DSS req, say like "10.1" its working for views. But is there a way to put a DSS req number into an notable event to make it searchable other than the name of the alert itself?

David_Naylor
Path Finder

Create a new field using eval and list it along with the other fields you care about in a table

|notablegeneratingsearch
|eval pci_id="10.1"
|table pci_id,alltheotherfieldsyoucareabout

Alternatively could use the tag field.

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...