Splunk Enterprise Security

Splunk Enterprise Security 3.3.1: Notable Event Suppression "The provided search is not valid"

kmanson
Path Finder

I am trying to suppress an event "Account Deleted" and receiving the error "The provided search is not valid" when trying to save the suppression. This search works in a normal search window.

index=notable source="Access - Account Deleted - Rule" _time>=1445961951 src_user="svc-udaadm" | regex user="\d{9}"

In another suppression I get the same error with this search, once again works in a normal search window.

index=notable source="Threat - Threat List Activity - Rule" threat_match_field="dest" threat_group=iblocklist_logmein _time>=1445984423 [| inputlookup whitelisted_logmein.csv | rename whitelisted_logmein as src | fields + src]

Splunk 6.3.0 with ES 3.3.1

0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

I'm pretty sure notable event suppressions follow the same rules as eventtypes - no subsearches, no pipes.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

I'm pretty sure notable event suppressions follow the same rules as eventtypes - no subsearches, no pipes.

Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In the last month, the Splunk Threat Research Team (STRT) has had 2 releases of new security content via the ...

Announcing the 1st Round Champion’s Tribute Winners of the Great Resilience Quest

We are happy to announce the 20 lucky questers who are selected to be the first round of Champion's Tribute ...

We’ve Got Education Validation!

Are you feeling it? All the career-boosting benefits of up-skilling with Splunk? It’s not just a feeling, it's ...