Splunk Enterprise

Is there a way to send all matching notable events to a custom index with very vague fields?

sm1tty
Loves-to-Learn Lots

Is there a way to send all matching notable events to a custom index with very vague fields (due to confidentiality reasons)?

I would like to send event data to a new index that basically says "You have a new alert" so that I can integrate it with an XSOAR solution without disclosing any confidential information. This is due to the way the ingestion script is written - anyone can modify the query to pull information from the logs. 

The intention is to notify analysts that an alert is present without (potentially) exposing this information to unauthorized individuals.

0 Karma

smurf
Communicator

Hi,

you could add "Log Event" Adaptive response action to your correlation search, or create a new search that would match notables and the action would be "Log Event". You can specify index, sourcetype, source and host as well as message of the event.

0 Karma
Get Updates on the Splunk Community!

Synthetic Monitoring: Not your Grandma’s Polyester! Tech Talk: DevOps Edition

Register today and join TekStream on Tuesday, February 28 at 11am PT/2pm ET for a demonstration of Splunk ...

Instrumenting Java Websocket Messaging

Instrumenting Java Websocket MessagingThis article is a code-based discussion of passing OpenTelemetry trace ...

Announcing General Availability of Splunk Incident Intelligence!

Digital transformation is real! Across industries, companies big and small are going through rapid digital ...