Splunk Enterprise Security

Integrating new events to an existing incident ticket created by the incident review dashboard

coolwater77
Explorer

Is it possible to add/attach new events that are generated using correlation searches or manually searches to an existing ticket/incident which got auto created by the incident review dashboard?

0 Karma

hcanivel
Explorer

I can't speak for the Enterprise Security app v2.0, but in the prior version, there is no direct link between notable events and the events correlation searches found that triggered them. In other words, the way the app had been designed previously was a one-way data flow: correlation_search(event)=>notable_event. Out of box, no two-way.

I would think the next best thing you can possibly do is to populate a new lookup with keys from notable events and other fields to keys to identify original events.

If you assembled keys based on throttle time and signature against which you can check new notable events, just append there.

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...