Splunk Enterprise Security

Integrating new events to an existing incident ticket created by the incident review dashboard

coolwater77
Explorer

Is it possible to add/attach new events that are generated using correlation searches or manually searches to an existing ticket/incident which got auto created by the incident review dashboard?

0 Karma

hcanivel
Explorer

I can't speak for the Enterprise Security app v2.0, but in the prior version, there is no direct link between notable events and the events correlation searches found that triggered them. In other words, the way the app had been designed previously was a one-way data flow: correlation_search(event)=>notable_event. Out of box, no two-way.

I would think the next best thing you can possibly do is to populate a new lookup with keys from notable events and other fields to keys to identify original events.

If you assembled keys based on throttle time and signature against which you can check new notable events, just append there.

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...