Splunk Enterprise Security

Adaptive Response - Log Event

Zerophage
New Member

Hello all,

I'm using a Correlation Search to create a Log Event as below:
hxxps://docs.splunk.com/Documentation/Splunk/7.2.6/Alert/LogEvents

Whilst it works, I can't figure out how to get more information into the "Event text" other than free text. I would like to include some data from the original correlation search.

The idea is it would trigger on a port scanning correlation for example and create "Port scan from x.x.x.x". Then there would be another search that picks up that event and correlates it with vuln scanning, etc.

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...