Splunk Enterprise Security

Notable Event Suppression where field is NULL?

richardphung
Communicator

Trying to create an ES Notable Event Suppression where the user value is null.
A direct search:

`get_notable_index`  | where isnull(user)

Gets me the events I would like to suppress.

If I try to create a notable event suppression within the incident review/eventtypes search, I get:

Message: Eventtype search string cannot be a search pipeline or contain a subsearch.

Is there any other way to do this?

Labels (1)
0 Karma

efika
Communicator

Just like the error message suggests. event suppression are just simple eventtypes in the form of notable_suppression-. And you can't use pipelines in eventtypes search.
You can simply use NOT(user).

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...