Splunk Enterprise Security

Old Notable event marked as unassigned.

rbal_splunk
Splunk Employee
Splunk Employee

We pushed the new app out on ES cluster. After the app push, old notable events are showing up as "assigned" and our SOC analysts are having to deal with 100s of old notable events.

0 Karma

rbal_splunk
Splunk Employee
Splunk Employee

Here is a procedure that could be attempted to fix the old notable that got unassigned.
- Check if the notable are unassigned on all SHC, if not maybe restore lookup incident_review_lookup
- Check for backup and see if restoring may be an option.
- The other option will be to re-build incident_review from audit data, which means we can only restore data for last 30days ( assuming audit retention is 30 days) Which means we can only rebuild for last 30 days.

  • Look at the incident_review_look that is stored in KVstore to see what is there and how many:
  • |inputlookup incident_review_lookup

  • Back up the incident_review_lookup:

  • |inputlookup incident_review_lookup |outputlookup support.csv

  • Verify you back up the incident_review_lookup:

  • |inputlookup support.csv

  • Check audit for notable events set time picker to all time verify the data looks good:

    index=_audit sourcetype=incident_review
    | rex "@@\w+,(?[^,]+),(?[^,]),(?[^,]),(?[^,]),(?.</em>),(?<user>[^,]+),(?<something>[^,]+)&quot; <br> | eval time=_time <br> | table comment owner rule_id rule_name status time urgency user </p></li> <li><p>Add the events found in Audit to the incident_review_lookup make sure time picker is set to all time: </p> <p>index=_audit sourcetype=incident_review <br> | rex &quot;@@\w+,(?<rule_name>[^,]+),(?<status>[^,]<em>),(?<owner>[^,]</em>),(?<urgency>[^,]<em>),(?<comment>.</em>),(?<user>[^,]+),(?<something>[^,]+)&quot; <br> | eval time=_time <br> | table comment owner rule_id rule_name status time urgency user <br> | outputlookup append=t incident_review_lookup </p></li> <li><p>Verify that your original events plus the audit event are now in inciden_review_lookup: </p></li> <li><p>|inputlookup incident_review_lookup</p></li> </ul> </ul>

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...