Splunk Enterprise Security

Search notable event with TAG value

dellytaniasetia
Explorer

Hi

I assign a TAG to event_id (notable event) in the Incident Review.

My question is, How to search all the notable event that I tag with value e.g. 'ABC' in the Splunk Search menu, instead of using Tag filter in the Incident review?

It is because I need to export to csv for management report.

Thanks

0 Karma

kchamplin_splun
Splunk Employee
Splunk Employee

If you run this search:

`notable` | search NOT `suppression` tag=<putyourtaghere>

Where you just replace with the name of your tag. For example I tagged one of my notables with KCHAMP so I used the following:

`notable` | search NOT `suppression` tag=KCHAMP

Let me know if this works for you. If you need to search across multiple tags, simply use an OR statement such as (tag=mytag1 OR tag=mytag2) etc.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...