Splunk SOAR

Issue with event_id Not Appearing When Sending Events from Splunk ES to SOAR

kn450
Explorer

Description:
Hello,

I am experiencing an issue with the "event_id" field when transferring notable events from Splunk Enterprise Security (ES) to Splunk SOAR.

Details:

  • When sending the event to SOAR using an Adaptive Response Action (Send to SOAR), the event is sent successfully, but the "event_id" field does not appear in the data received in SOAR.

Any assistance or guidance to resolve this issue would be greatly appreciated.

Thank you

Labels (1)
Tags (1)
0 Karma

wazza
Loves-to-Learn Everything

Hi @kn450 , @Saba 

 

I have encountered this same issue a few days back and solved it by running a playbook to do a splunk search to create the event_id from the data in my artifact. The macro `get_event_id_meval` is used to create the event id from the indexer_guid, index and event_hash fields, separated by "@@", i.e. indexer_guid@@index@@event_hash.

Is this the best way? Probably not, but it does work and I can always update it should I find a better solution.

See the search below.

index=notable search_name="<your_search_name>" firstTime="xxxx" lastTime="xxxx"
| eval `get_event_id_meval`
| fields event_id  

Tags (1)
0 Karma

Saba
Observer

Hi @kn450 ,

Having the same issue, did you find a solution for this?

Thank You!

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...