Splunk Search

Rename the existing Correlation search?

Path Finder

Hi Splunkers,

Whats the best way to rename the existing correlation search.?

alt text


There is an easier solution.
Click Settings > Searches,reports and alerts > search the name of the correlation
Under Actions, click Edit > Advanced Edit > and edit "action.correlationsearch.label" > Save

If you refresh the content page , it should be the new name you set it to



Upgrade correlation searches in Splunk Enterprise Security
Starting in Splunk Enterprise Security version 4.6.0, correlationsearches.conf is no longer used to define correlation searches. Instead, savedsearches.conf uniquely identifies correlation searches using the action.correlationsearch.enabled=1 parameter. The correlationsearches.conf file is deprecated.


The above poster's answer does not work on the latest Enterprise Security version.

You must visit the following file


Then modify two lines. I copied and pasted my config below with the parts that need to be modified in bold.

[Threat - User Failed to Login More Than 100 Times - Rule]
action.correlationsearch.enabled = 1
action.correlationsearch.label = User Failed to Login More Than 100 Times

Restart your Splunk instance after by running the following

sudo YOUR_SPLUNK_DIRECTORY/bin/splunk restart

Super Champion

Hi, they have to be renamed at the config file level because there are two configuration files involved.

Refer this link


cd ~/Downloads/SplunkEnterpriseSecurityInstaller/default/src/etc/apps/SA-ThreatIntelligence/default/

grep "Rule\]" savedsearches.conf 
 [Threat - Threat List Activity - Rule]
 [Threat - Watchlisted Events - Rule]

grep "Rule\]" correlationsearches.conf 
[Threat - Threat List Activity - Rule]
 [Threat - Watchlisted Events - Rule]

I hope this helps you!

Get Updates on the Splunk Community!

Introducing Ingest Actions: Filter, Mask, Route, Repeat

WATCH NOW Ingest Actions (IA) is the best new way to easily filter, mask and route your data in Splunk® ...

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...