- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is there a way to automatically close all of the notables associated with an investigation when you close the investigation itself? Currently Splunk just gives me a warning that "x number of notables are still open in this investigation." The only way i have found to close notables is to go back to the "incident review" interface and manually filter and then change their state to closed. This seems like an unnecessary step if I'm already closing the investigation. Am i missing something?
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

You'll have to create a Python/JavaScript script to interact with Splunk's API to programtically close the notable events. No direct way possible as far as I know for now. Here's a great article by @LukeMurphey which you can refer to build your custom script. It's a tad old, but still works like charm, if you're using Splunk version 7.X. For versions 8.x and above, you may have to edit the code to make it compatible with Python 3, or use JavaScript, the safe option:
How to programmatically edit notable events in Splunk
If this helps, please mark it as an accepted answer. This will help other Splunkers to implement the solution for their requirements.
Thanks,
S
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

You'll have to create a Python/JavaScript script to interact with Splunk's API to programtically close the notable events. No direct way possible as far as I know for now. Here's a great article by @LukeMurphey which you can refer to build your custom script. It's a tad old, but still works like charm, if you're using Splunk version 7.X. For versions 8.x and above, you may have to edit the code to make it compatible with Python 3, or use JavaScript, the safe option:
How to programmatically edit notable events in Splunk
If this helps, please mark it as an accepted answer. This will help other Splunkers to implement the solution for their requirements.
Thanks,
S
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
