Splunk Enterprise Security

Integrating new events to an existing incident ticket created by the incident review dashboard

coolwater77
Explorer

Is it possible to add/attach new events that are generated using correlation searches or manually searches to an existing ticket/incident which got auto created by the incident review dashboard?

0 Karma

hcanivel
Explorer

I can't speak for the Enterprise Security app v2.0, but in the prior version, there is no direct link between notable events and the events correlation searches found that triggered them. In other words, the way the app had been designed previously was a one-way data flow: correlation_search(event)=>notable_event. Out of box, no two-way.

I would think the next best thing you can possibly do is to populate a new lookup with keys from notable events and other fields to keys to identify original events.

If you assembled keys based on throttle time and signature against which you can check new notable events, just append there.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Synthetic Monitoring - Resolved Incident on Detector Alerts

We’ve discovered a bug that affected the auto-clear of Synthetic Detectors in the Splunk Synthetic Monitoring ...

Video | Tom’s Smartness Journey Continues

Remember Splunk Community member Tom Kopchak? If you caught the first episode of our Smartness interview ...

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud?

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud? Learn how unique features like ...