Alerting

Splunk ES - Notable Events

Sultan77
Loves-to-Learn Lots

Good day for everyone,

I've built multiple use-cases through correlation search.

The concern here , I am getting multiple alerts for same case.

how can I set it to give only one alert contain all data.

screenshot can explain more: 

123.PNG

Labels (3)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Sultan77 ,

this means that many Correlation Searches (or Detections from 8.X) triggered events.

It isn't a good idea grouping different Detections in one alert.

Anyway, the only solution is disable Notable (or Finding) creation and use only Risk Score, then use a Finding Based Detection to have only one Finding containing all the others.

In addition, you can group more Findings in one Investigation.

Ciao.

Giuseppe

0 Karma

Sultan77
Loves-to-Learn Lots

Dear @gcusello 

Can you explain how to group more than one finding in one investigation? 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Sultan77 ,

if you have ES 7.x, you have to flag all the events and add to the same investigation.

I haven't an ES 8.x to guide you  in this case.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

New Year. New Skills. New Course Releases from Splunk Education

A new year often inspires reflection—and reinvention. Whether your goals include strengthening your security ...

Splunk and TLS: It doesn't have to be too hard

Overview Creating a TLS cert for Splunk usage is pretty much standard openssl.  To make life better, use an ...

Faster Insights with AI, Streamlined Cloud-Native Operations, and More New Lantern ...

Splunk Lantern is a Splunk customer success center that provides practical guidance from Splunk experts on key ...