Splunk ITSI

Splunk ITSI Correlation search Name

ManjunathNargun
New Member

hi,

How to identify the correlation search name using the Report name found in skipped searches.

We are trying to resolve the skipped searches issue. Any help would be much appreciated.

ManjunathNargun_1-1693583296515.png

 

Thanks!

Labels (1)
0 Karma

andrew_nelson
Communicator

Extract the search key (The hex string you have redacted) using either split or rex to a field called keyID substituting search_name for whatever the field is called in your data. 

 

| eval keyID=mvindex(split(search_name, " - "), 1)

 

OR 

 

| rex field=search_name "Indicator - (?<keyID>[^\s]+) - "

 

 

Then you can use the ITSI API endpoints to tie them to the base searches: 

 

| join type=left keyID 
    [| rest splunk_server=local /servicesNS/nobody/SA-ITOA/itoa_interface/kpi_base_search report_as=text 
    | eval value=spath(value,"{}") 
    | mvexpand value 
    | eval title = spath(value, "title"), keyID = spath(value, "_key"), frequency = spath(value, "alert_period") 
    | fields title, keyID, frequency ]  

 

0 Karma
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureThursday, March 27, 2025  |  11AM PST / 2PM EST | Register NowStep boldly ...

Splunk AppDynamics with Cisco Secure Application

Web applications unfortunately present a target rich environment for security vulnerabilities and attacks. ...