Splunk Enterprise Security

Sendalert risk does not populate source_guid / source_event_id — UI-created risk events do

Sky
New Member

Hi everyone,

I’m seeing a discrepancy with the Risk Modular Alert Action in Splunk ES. When triggering the risk action via sendalert risk, the resulting risk events do not include source_guid and source_event_id. However, when creating a risk event via the UI (e.g., correlation search action configured in the UI, or “Create Risk Event” from a workflow action), those fields are present. I’m trying to determine if this is version/content-related or a bug.

Environment

  • Splunk Enterprise: 9.2.4

  • Splunk Enterprise Security: 8.2.1

Expected behavior

Risk events should include:

  • source_guid (a GUID)

  • source_event_id ({GUID}@@{index}@@{GUID_without_dashes})

Actual behavior

  • Via sendalert risk: Risk modifier events are created but missing source_guid / source_event_id.

  • Via UI (configured risk action / “Create Risk Event”): Risk events include both fields as expected.

Impact

  • These missing fields lead to downstream issues: finding-based detections (formerly Risk Incident Rules) don’t behave as expected, and resulting items do not appear in the Analyst Queue, even though the risk event exists.

  • UI-created risk events with the same semantics do surface correctly in the Analyst Queue.

Questions for the community

  1. On your Splunk/ES version, do sendalert risk and UI-created risk events both populate source_guid / source_event_id, or do you see the same discrepancy?

  2. Was there a change in recent ES/Content versions affecting sendalert risk specifically? Any known issue/bug?

  3. Do you explicitly populate these fields via macro/enrichment for sendalert, or should the action populate them natively?

  4. Has Splunk stated any plans to deprecate or remove creating risk events via SPL (e.g., sendalert risk / collectrisk) in favor of UI-driven actions? If so, what’s the recommended replacement and timeline?

Thanks in advance for your insights!

-- Sky

Labels (1)
0 Karma

Sky
New Member

Update — Root Cause Found

I traced this through the ES source code. There are two separate code paths for creating risk events in SA-ThreatIntelligence:

- The UI-configured risk action generates source_guid and source_event_id as expected.
- The | sendalert risk path simply never received that same functionality. The logic exists and has no special dependencies — it was just never added to this code path.

This isn't a deprecation or intentional change — it's an oversight. The event ID generation was likely introduced alongside the Findings framework but only implemented in the UI path, not in the sendalert path.

If anyone else is affected: the discrepancy is in the risk alert action handler, and the fix would be minimal.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas

Why Splunk Customers Should Attend Cisco Live 2026 Las Vegas     Cisco Live 2026 is almost here, and this ...

What Is the Name of the USB Key Inserted by Bob Smith? (BOTS Hint, Not the Answer)

Hello Splunkers,   So you searched, “what is the name of the usb key inserted by bob smith?”  Not gonna lie… ...

Automating Threat Operations and Threat Hunting with Recorded Future

    Automating Threat Operations and Threat Hunting with Recorded Future June 29, 2026 | Register   Is your ...