Splunk Enterprise Security

automatically close all associated notables when an investigation is closed

trobes
Engager

Is there a way to automatically close all of the notables associated with an investigation when you close the investigation itself?  Currently Splunk just gives me a warning that "x number of notables are still open in this investigation."  The only way i have found to close notables is to go back to the "incident review" interface and manually filter and then change their state to closed.  This seems like an unnecessary step if I'm already closing the investigation.  Am i missing something? 

0 Karma
1 Solution

shivanshu1593
Builder

You'll have to create a Python/JavaScript script to interact with Splunk's API to programtically close the notable events. No direct way possible as far as I know for now. Here's a great article by @LukeMurphey which you can refer to build your custom script. It's a tad old, but still works like charm, if you're using Splunk version 7.X. For versions 8.x and above, you may have to edit the code to make it compatible with Python 3, or use JavaScript, the safe option:

How to programmatically edit notable events in Splunk

If this helps, please mark it as an accepted answer. This will help other Splunkers to implement the solution for their requirements.

Thanks,

S

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###

View solution in original post

0 Karma

shivanshu1593
Builder

You'll have to create a Python/JavaScript script to interact with Splunk's API to programtically close the notable events. No direct way possible as far as I know for now. Here's a great article by @LukeMurphey which you can refer to build your custom script. It's a tad old, but still works like charm, if you're using Splunk version 7.X. For versions 8.x and above, you may have to edit the code to make it compatible with Python 3, or use JavaScript, the safe option:

How to programmatically edit notable events in Splunk

If this helps, please mark it as an accepted answer. This will help other Splunkers to implement the solution for their requirements.

Thanks,

S

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...

[Live Demo] Watch SOC transformation in action with the reimagined Splunk Enterprise ...

Overwhelmed SOC? Splunk ES Has Your Back Tool sprawl, alert fatigue, and endless context switching are making ...

What’s New & Next in Splunk SOAR

Security teams today are dealing with more alerts, more tools, and more pressure than ever.  Join us on ...