Splunk IT Service Intelligence

Splunk ITSI Correlation search Name

ManjunathNargun
New Member

hi,

How to identify the correlation search name using the Report name found in skipped searches.

We are trying to resolve the skipped searches issue. Any help would be much appreciated.

ManjunathNargun_1-1693583296515.png

 

Thanks!

Labels (1)
0 Karma

andrew_nelson
Communicator

Extract the search key (The hex string you have redacted) using either split or rex to a field called keyID substituting search_name for whatever the field is called in your data. 

 

| eval keyID=mvindex(split(search_name, " - "), 1)

 

OR 

 

| rex field=search_name "Indicator - (?<keyID>[^\s]+) - "

 

 

Then you can use the ITSI API endpoints to tie them to the base searches: 

 

| join type=left keyID 
    [| rest splunk_server=local /servicesNS/nobody/SA-ITOA/itoa_interface/kpi_base_search report_as=text 
    | eval value=spath(value,"{}") 
    | mvexpand value 
    | eval title = spath(value, "title"), keyID = spath(value, "_key"), frequency = spath(value, "alert_period") 
    | fields title, keyID, frequency ]  

 

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...