Splunk Search

How to write a Query to identify Splunk notable rule triggers with change in urgency?

Manoj8888
Engager

Hello,

 

I am trying write a query to  identify if any Splunk notable rule triggers with change in Urgency (i.e. from medium to high).Cloud any one please  help me in building  the query?

Labels (1)
0 Karma

smurf
Communicator

Hi,

When any Urgency is selected when editing a Notable (even if it is the same as the original Urgency) can be found like this:

index=_audit source=notable_update_rest_handler urgency=*

 

Originally, I thought you were looking for a Notable that has a different Urgency than what you defined in Severity in the correlation search. That could be found like this:

`notable` | where severity != urgency 

 

Get Updates on the Splunk Community!

Splunk Enterprise Security(ES) 7.3 is approaching the end of support. Get ready for ...

Hi friends!    At Splunk, your product success is our top priority. With Enterprise Security (ES), we're here ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...