Splunk Enterprise Security

Integrating new events to an existing incident ticket created by the incident review dashboard

coolwater77
Explorer

Is it possible to add/attach new events that are generated using correlation searches or manually searches to an existing ticket/incident which got auto created by the incident review dashboard?

0 Karma

hcanivel
Explorer

I can't speak for the Enterprise Security app v2.0, but in the prior version, there is no direct link between notable events and the events correlation searches found that triggered them. In other words, the way the app had been designed previously was a one-way data flow: correlation_search(event)=>notable_event. Out of box, no two-way.

I would think the next best thing you can possibly do is to populate a new lookup with keys from notable events and other fields to keys to identify original events.

If you assembled keys based on throttle time and signature against which you can check new notable events, just append there.

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...