Splunk Enterprise Security

How to apply Throttling based on a condition for a notable event generation?

vn_g
Path Finder

Requirement 1 :
Eg : I have a correlation search which generates , 2000 events with in 24 hours with the same Title "Important- Password Expiration Notice".
-- I shouldn't have 2000 notable events created in the Incident Review Dashboard. I should have only 1 notable event.
-- If the Title is different , then a notable event should be created.

I have tested updating Window duration as 24 hours and Fields to group by with "Title" field name , but it is working incorrectly.
It is not generating a notable event , if the Title is different.

Requirement 2 :
Is there a way , I can update the existing notable event.
Eg : Existing Notable event Title : Important- Password Expiration Notice
        Existing Field value : abcuser@company.com
        It should append the new value to existing field.
           --abcuser@company.com
           --xyzuser@compay.com

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...