Splunk Enterprise Security

Splunk Enterprise Security: What is the distinction between savedsearch and correlation search?

jgbricker
Contributor

Trying to figure out why the Splunk Enterprise Security App has a savedsearch and a correlation search for brute force seems redundant but probably missing a key distinction. Can someone give me some guidance?

0 Karma
1 Solution

starcher
Influencer

savedsearch is the search knowledge object for the notable. the correlationsearch.conf stanza goes with that and ES needs it for all the notable like settings. hooks to active responses, title, links for drill down etc.

View solution in original post

starcher
Influencer

savedsearch is the search knowledge object for the notable. the correlationsearch.conf stanza goes with that and ES needs it for all the notable like settings. hooks to active responses, title, links for drill down etc.

jgbricker
Contributor

Okay so to clarify further, I would need both if I were adding my own detections into the ES framework? I didn't see that in the documentation.

0 Karma

starcher
Influencer

Yes and the GUI based create process handles all that for you.
http://docs.splunk.com/Documentation/ES/4.6.0/Tutorials/CorrelationSearch

0 Karma

smoir_splunk
Splunk Employee
Splunk Employee

Yes, you would need stanzas in both if you were to add your own correlation searches. However, I'd recommend that you use the content management page to create the searches so that the proper attributes are saved in the proper locations. Starting in 4.6.0, only savedsearches.conf references are needed.

0 Karma

jgbricker
Contributor

Okay, it does appear that when i add a correlation search via the UI (Content Management > Create Content) a savedsearch is created automatically. Doesn't this mean Splunk has to search for the same thing twice to do all the things it needs to do for ES. Perhaps I'm still confused here.

0 Karma

smoir_splunk
Splunk Employee
Splunk Employee

No, the search isn't performed twice, it's just a detail about how the search is stored.

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...