Splunk Enterprise Security

Splunkcloud ES - Missing an additional field in a notable event

vy
Explorer

Hi Team,

I have a notable event (Excessive Failed Logins on Multiple Targets) that I'm expecting to see the "dest" field. I've fleshed out asset summary and source all of the source details are populating. I'm seeing dest in other different notable events too. It's just this particular notable event. If I pull up the correlated events dest shows as a field and I can validate that values are accurate too.

Any reason why dest wouldn't be showing up in the additional fields?

Labels (2)
0 Karma

Kk95
Observer

@vy  Have you found any solution for this

0 Karma

lakshman239
Influencer

Just for clarity, when the correlation search runs and produces the events/results, it should have a field 'dest' with some values. Once these events/results are written to the index=notable (can be accessed  via notable macro), dest field should be there with some value, for it to appear in the Incident review screen, additional fields.

0 Karma

lakshman239
Influencer

If you go to `notable` and search for your search, in the list of field values, are you seeing 'dest'?

0 Karma

vy
Explorer

No, "dest" for this particular search does not show under the `notable` macro. However, if I pull up the resultant set of events (Contributing Events) from the notable event, "dest" is there. Likely because it's being parsed by the data model.

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...