Splunk Enterprise Security

Splunkcloud ES - Missing an additional field in a notable event

vy
New Member

Hi Team,

I have a notable event (Excessive Failed Logins on Multiple Targets) that I'm expecting to see the "dest" field. I've fleshed out asset summary and source all of the source details are populating. I'm seeing dest in other different notable events too. It's just this particular notable event. If I pull up the correlated events dest shows as a field and I can validate that values are accurate too.

Any reason why dest wouldn't be showing up in the additional fields?

Labels (2)
0 Karma

lakshman239
Influencer

Just for clarity, when the correlation search runs and produces the events/results, it should have a field 'dest' with some values. Once these events/results are written to the index=notable (can be accessed  via notable macro), dest field should be there with some value, for it to appear in the Incident review screen, additional fields.

0 Karma

lakshman239
Influencer

If you go to `notable` and search for your search, in the list of field values, are you seeing 'dest'?

0 Karma

vy
New Member

No, "dest" for this particular search does not show under the `notable` macro. However, if I pull up the resultant set of events (Contributing Events) from the notable event, "dest" is there. Likely because it's being parsed by the data model.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...