Splunk Enterprise Security

adding a custom field to notable and update the value via api

gigahex
New Member

Hi Team,

I am working with Splunk version 7.3.2, and I would like to add a custom field called jira_ticket to notable events. The goal is to initially populate this field during the event creation process and later update its value via the API as the ticket progresses through different stages in Jira.

Here are my key questions:

  1. What is the best way to add a custom field like jira_ticket to notable events? Are there specific configurations or updates needed in correlation searches or incident review settings?
  2. How can I reliably update this field through the API after it has been created? Are there any specific endpoints or parameters I need to be aware of?
  3. Since I am using an older Splunk version (7.3.2), are there any limitations or additional considerations I should keep in mind while implementing this?

If anyone has successfully implemented a similar setup or can point me toward documentation, examples, or best practices, I’d greatly appreciate your input.

Thank you in advance!

 

Labels (3)
0 Karma

alexeyglukhov
Path Finder

hey hey, I am in a similar situation, and currently exploring potential solutions, did you you end up with something working ? (thanks for any help in advance)

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...