Splunk Enterprise Security

How to create an alert that triggers when field value status changes?

mahendra559
New Member

Actual requirement is when a status field value changes from one to another, an alert needs to be triggered.
Below are the status field values:

Extended recovery
Investigation suspended
False-positive
Investigating
Service degradation
Service restored
Restoring service
Post-incident report published

Ex: If status field value changes from "false-positive" to "investigating" then alert should be triggered.
If field value changes from "false-positive" to "false-positive" then no alert should be triggered.

Labels (2)
0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...