Splunk Enterprise Security

automatically close all associated notables when an investigation is closed

trobes
Engager

Is there a way to automatically close all of the notables associated with an investigation when you close the investigation itself?  Currently Splunk just gives me a warning that "x number of notables are still open in this investigation."  The only way i have found to close notables is to go back to the "incident review" interface and manually filter and then change their state to closed.  This seems like an unnecessary step if I'm already closing the investigation.  Am i missing something? 

0 Karma
1 Solution

shivanshu1593
Builder

You'll have to create a Python/JavaScript script to interact with Splunk's API to programtically close the notable events. No direct way possible as far as I know for now. Here's a great article by @LukeMurphey which you can refer to build your custom script. It's a tad old, but still works like charm, if you're using Splunk version 7.X. For versions 8.x and above, you may have to edit the code to make it compatible with Python 3, or use JavaScript, the safe option:

How to programmatically edit notable events in Splunk

If this helps, please mark it as an accepted answer. This will help other Splunkers to implement the solution for their requirements.

Thanks,

S

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###

View solution in original post

0 Karma

shivanshu1593
Builder

You'll have to create a Python/JavaScript script to interact with Splunk's API to programtically close the notable events. No direct way possible as far as I know for now. Here's a great article by @LukeMurphey which you can refer to build your custom script. It's a tad old, but still works like charm, if you're using Splunk version 7.X. For versions 8.x and above, you may have to edit the code to make it compatible with Python 3, or use JavaScript, the safe option:

How to programmatically edit notable events in Splunk

If this helps, please mark it as an accepted answer. This will help other Splunkers to implement the solution for their requirements.

Thanks,

S

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
0 Karma
Get Updates on the Splunk Community!

Enter the Dashboard Challenge and Watch the .conf24 Global Broadcast!

The Splunk Community Dashboard Challenge is still happening, and it's not too late to enter for the week of ...

Join Us at the Builder Bar at .conf24 – Empowering Innovation and Collaboration

What is the Builder Bar? The Builder Bar is more than just a place; it's a hub of creativity, collaboration, ...

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...