Splunk Enterprise Security

Correlation Search - Search to either email or allow notable event to be fired.

llmillerjr
Observer

We have some users asking for Notable Events and emails depending on search results.

Example...If the number of errors returned the last 5 minutes is < 5, send an email.  If > 5 allow notable event to be generated.

I don't want to create 2 searches for this (alert and correlation search).  Is it possible to write 1 search to  accomplish this?

Labels (1)
0 Karma

thambisetty
SplunkTrust
SplunkTrust

I don't think its possible with default Splunk alert action behavior.

————————————
If this helps, give a like below.
0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...