Splunk Enterprise

How to Export Notable Events from Incident Review to CSV with Specific Fields?

KKuser
Path Finder

I'm looking to export notable events from the Incident Review dashboard in Splunk Enterprise Security to a CSV/Excel file. I need to include the following details:

  • Notable Name (Rule Name)
  • Notable Triggered Time
  • Time Assigned for Investigation
  • Conclusion (e.g., True Positive (TP), False Positive (FP), Benign True Positive (BTP))
  • Open/Closed Status

What would be the best SPL query or method to extract this information? Also, is there a way to automate this export on a scheduled basis?

 

Currently using the SPL query:

`notable`
| eval original_time=strftime(orig_time,"%c")
| eval reviewing_time=strftime(review_time,"%c")
| table search_name, comment, disposition_label, original_time, reviewing_time, owner, search_name, reviewer, status, status_description, status_label, urgency, username


and I'm getting results. However, I'm not getting an ID to locate and go through an individual notable if I wanted to. How can I search for a specific notable? Is there a tracking number for a notable? I'd like to include it in my table as well.

Labels (1)
0 Karma

livehybrid
Super Champion

Hi @KKuser 

You probably want to include the "source_event_id" field which is a unique field for each of your notable events.

Please let me know how you get on, and please consider adding karma or accepting this post if it has helped.

 

0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...