Splunk Enterprise Security

Splunk Enterprise Security: How do you stop emails from a suppressed alert in a correlation search?

theslobb
Explorer

I have a search that monitors alerts created by an IDS. I have begun going through the triggered alerts to suppress the known false positives, however, I still receive an email notification about the suppressed alert after it is triggered in the correlation search.

How do I turn off the emails for suppressed alerts?

dylan_yoder
New Member

I figured out a workaround to this. By adding the following to the end of my correlation rule it checks the suppressed eventtypes first to see if there are anything that is suppressed with matching fields. If it find anything with matching fields that hasn't expired it doesn't return any results so the emails/tickets/notable/adaptive response actions are not triggered.

| search NOT
[ | 'suppression_eventtypes '
| eval _raw = search
| extract
| search source = "insert correlation rule name here" | eval tnow = now() | where tnow > start_time AND tnow ]

suppression _eventtypes is a macro..

| rest splunk_server=local count=0 /services/saved/eventtypes
| search title=notable_suppression*
| rename title as eventtype
| rex field=eventtype "notable_suppression-(?.+)"
| rex field=search "_time>=?(?\d+)"
| rex field=search "_time<=?(?\d+)"

0 Karma

rdeloach
Explorer

The answer from Splunk is that the notable event suppression only hides notable events from the Incident Review dashboard. SInce the alert conditions are still met it will still fire the Adaptive Response action, send email, etc. The only way to prevent the alert from firing any other action is to either build the suppression in your correlation search or change the alert trigger conditions.

wilhelmF
Path Finder

It would be good if splunk could provide a template how to dynamically at supressions when supressed in the inident review.

0 Karma

wilhelmF
Path Finder

@rdeloach Did you get an answer from Splunk?

dacosta
Explorer

TheSlobb, did you ever get an answer on this? Im getting emails on a suppressed alert as well.

thanks,

Dan

0 Karma

wilhelmF
Path Finder

No I still don't have suitable workaround.

0 Karma

rdeloach
Explorer

I'm having this issue also. Not only with emails but adaptive response actions also. Trying to suppress a notable event from occurring but still getting a barrage of emails or incidents in a ticketing system isn't ideal. I'm going to put a support ticket in to see if they have any answers on it.

0 Karma

dylan_yoder
New Member

I figured out a workaround to this. By adding the following to the end of my correlation rule it checks the suppressed eventtypes first to see if there are anything that is suppressed with matching fields. If it find anything with matching fields that hasn't expired it doesn't return any results so the emails/tickets/notable/adaptive response actions are not triggered.

| search NOT
[ | suppression_eventtypes
| eval _raw = search
| extract
| search source = ""
| eval tnow = now()
| where tnow > start_time AND tnow
| table ]

0 Karma

dylan_yoder
New Member

suppression _eventtypes is a macro..

| rest splunk_server=local count=0 /services/saved/eventtypes
| search title=notable_suppression*
| rename title as eventtype
| rex field=eventtype "notable_suppression-(?.+)"
| rex field=search "_time>=?(?\d+)"
| rex field=search "_time<=?(?\d+)"

0 Karma

wilhelmF
Path Finder

Meanwhile I created an additional correlation search which sends a mail. It's not optimal but it works.

| inputlookup es_notable_events 
 | search urgency=high OR urgency=critical
 | eval last5min=now()-310
 | where _time >= last5min
0 Karma

theslobb
Explorer

This is clever, and I really wish I could use this as an alternative. However, the information in the notable events logs are not enough to give context to the users who receive the alerts most times.

0 Karma

phillip_rice
Explorer

Was this ever resolved?

Thanks

0 Karma

theslobb
Explorer

I never got a resolution for this one.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...