Splunk ITSI

How to change notable event aggregation policy for a set of episodes?

PotatoDataUser
Explorer

My team has setup with correlation_search_1, service1 creating notable events that have the notable event aggregation policy - policy1. 

Now I made additions, correlation_search2, service2 and policy2.

But when I went to the episodes review window I find out that notable event episodes from search2 are still using policy1, how do I get these set of episodes to follow policy2 without disturbing the previous setup following policy1, I cant find any setting that allows me to do so, please help where I can find this if it exists.

Labels (1)
0 Karma

jg91
Path Finder

If you want to use different policies for different correlation searches, You should add some filtering criteria in your second Notable Event Aggregation Policy (NEAP). For example you can use search_name (or source) matches correlation_search2 in include the events if section of Filtering Criteria and Instructions tab in your second NEAP.
5734be35-c327-43cf-87eb-78bbc3883cb9.png

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...