Splunk Enterprise Security

notables relation with device events

hoytn
Explorer

Is there any way that a notable is linked to the events that generated it?

0 Karma

somanath73
Engager

At the end of the correlation search, add "| map_notable_fields" to pipe the results to the map_notable_fields macro. This will display all configured fields available in the body of the notable event. To configure new fields, edit the "Event Fields List" section of the config file "/etc/apps/SplunkEnterpriseSecuritySuite/appserver/event_renderers/notable2.html".

The below link can be referred for the same as well.
https://answers.splunk.com/answers/183891/configuring-additional-fields-for-a-notable-event.html

hoytn
Explorer

Thank you for the answer. What I am interested in, is if there is any (default) way that the notable is linked to the events that generated it. Without any action from correlation search author. (without defining a drilldown for example)

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...