Splunk Enterprise Security

'Sourcetype= stash' value in 'Enterprise Security' incidents.

vikram1583
Explorer

in enterprise security in incidents additional fields for all incidents i am seeing Sourcetype= stash its not showing original source type name why?

#Additional Fields#              # Value#                                        #Action#
Operating System                Linux 
Severity                                  medium 
Sourcetype                            stash 
0 Karma

@vikram1583 the default sourcetype for Summary Indexes is stash. For example those collected via collect command or si ex: sichart, sitimechart etc.

The reason for this is that License usage is not incurred unless the sourcetype is overridden from stash to something else. Refer to documentation for sourcetype argument details and default stash value: https://docs.splunk.com/Documentation/Splunk/latest/SearchReference/collect#arg-options

Ideally you should create new fields like orig_sourcetype or any other marker field to keep the value of original sourcetype and keep stash as the sourcetype for summaries unless license cost for summary index is not an issue for you!

____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma
Get Updates on the Splunk Community!

What’s new on Splunk Lantern in August

This month’s Splunk Lantern update gives you the low-down on all of the articles we’ve published over the past ...

Welcome to the Future of Data Search & Exploration

You have more data coming at you than ever before. Over the next five years, the total amount of digital data ...

This Week's Community Digest - Splunk Community Happenings [8.3.22]

Get the latest news and updates from the Splunk Community here! News From Splunk Answers ✍️ Splunk Answers is ...