Alerting

Is there a good source of document for Splunk event correlation? or any suggestions?

clyde772
Communicator

Anybody out there had experience trying to correlate events with Splunk.

A scenario would be like this:

(Source : A Event XXX) + (Source : B Event YYY) = ( Result : kick off an event using a scipt )

Is correlation supported with Splunk?

Tags (1)
0 Karma

piebob
Splunk Employee
Splunk Employee

BunnyHop
Contributor

This is something I am trying to accomplish altogether by creating my own app with saved searches. This helps seggregate the correlated data I want/need while making it easily accessible for all other parties. The app piece is purely optional, but when you do a saved search, you can kick off a script or an alert, base on your own choosing.

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

This is exactly what Splunk searches and alerts do, though I would have to assume there are also implicit time bounds on your correlation.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Introduction to Splunk AI

How are you using AI in Splunk? Whether you see AI as a threat or opportunity, AI is here to stay. Lucky for ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Maximizing the Value of Splunk ES 8.x

Splunk Enterprise Security (ES) continues to be a leader in the Gartner Magic Quadrant, reflecting its pivotal ...