I'm looking to export notable events from the Incident Review dashboard in Splunk Enterprise Security to a CSV/Excel file. I need to include the following details:
What would be the best SPL query or method to extract this information? Also, is there a way to automate this export on a scheduled basis?
Currently using the SPL query:
`notable`
| eval original_time=strftime(orig_time,"%c")
| eval reviewing_time=strftime(review_time,"%c")
| table search_name, comment, disposition_label, original_time, reviewing_time, owner, search_name, reviewer, status, status_description, status_label, urgency, username
and I'm getting results. However, I'm not getting an ID to locate and go through an individual notable if I wanted to. How can I search for a specific notable? Is there a tracking number for a notable? I'd like to include it in my table as well.
Hi @KKuser
You probably want to include the "source_event_id" field which is a unique field for each of your notable events.
Please let me know how you get on, and please consider adding karma or accepting this post if it has helped.