Splunk Search

how to label the attributing events additional fields which can associate the correlation search and drill-down search?

jaro
Explorer

Here are the screenshots:

In incident review setting, I have already labeled signature:

jaro_0-1704421786405.png

Then in Correlation Search content setting, also I have setting the search query which could result in fields with signature. This search can be run normally in search head and show the result I want.

jaro_1-1704421940091.png

But here related to drill-down search or description, this $signature$ can not show in notable of incident review:

jaro_2-1704422095632.png

jaro_3-1704422192557.png

 

May I ask how to solve this issue?

Labels (1)
Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @jaro,

to see a field in the fields of a Notable (in the Incident Review dashboard) you have to check if this field is displayed in the Notable event (running index=notable search=your_correlation_search),

if not, probably isn't displayed in the output of the correlation search: manually run your correlation search and see if the field is displayed, if not add it to the correlation Search.

One additional hint: don't modify the Correlation Search, but clone it and modify and enable only the cloned one.

If the field is present in the Notable event, you have also to check if it's present in the default visible fields, that you can find these configurations at [Configure > Incident management > Incident Review Settings] in the section Incident Review - Event Attributes.

Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @jaro,

to see a field in the fields of a Notable (in the Incident Review dashboard) you have to check if this field is displayed in the Notable event (running index=notable search=your_correlation_search),

if not, probably isn't displayed in the output of the correlation search: manually run your correlation search and see if the field is displayed, if not add it to the correlation Search.

One additional hint: don't modify the Correlation Search, but clone it and modify and enable only the cloned one.

If the field is present in the Notable event, you have also to check if it's present in the default visible fields, that you can find these configurations at [Configure > Incident management > Incident Review Settings] in the section Incident Review - Event Attributes.

Ciao.

Giuseppe

jaro
Explorer

Thanks @gcusello.  ---to check if this field is displayed in the Notable event (running index=notable search=your_correlation_search), yes, I have display the result "signature" in the search I ran. However, the below description can not show the field value "signature" I search in correlation search as $signature$. 

Also I have tried eval other name equal to field signature, still nothing.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jaro ,

if the field is in the Notable index, can be displayed.

Did you checked if it's in the visualized fields?

Ciao.

Giuseppe

0 Karma

jaro
Explorer

It's OKAY now. In next triggered notable, it displayed. Thank you @gcusello

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @jaro ,

good for you, see next time!

Ciao and happy splunking

Giuseppe

P.S.: Karma Points are appreciated 😉

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...