Closed marpoe closed 4 months ago
Ok, something to add: I saw it must be unique based on reference, source & type which can be filled based on the splunk alerts data.
The display name of the link will be cutted after some lenght what leads to the fact that it's unique. The link is working correctly
Hello @marpoe Thank you for submitting your issue In order to check first if we can make it work otherwise, could you add in your search something like ‘| eval unique=123456789’ to get a new column in your result Then run the custom alert action with the Alert Action mode and set the Unique ID field parameter to « unique » See if it’s working like that first or not
Hello @LetMeR00t - Thank you for your reply.
As you suggested, I've created the following entries by my splunk search
_time | unique | url |
---|---|---|
2024-04-29 10:27:02 | 123456789 | www.test.com |
2024-05-01 15:57:01 | 123456789 | www.test.com |
2024-04-23 05:06:04 | 123456789 | www.test.com |
2024-04-30 14:52:01 | 123456789 | www.test.com |
Alert setting:
Result Log:
error=CreateError - Alert alert:splunk:123456789 already exists in organisation xxxxx"
Result TheHive:
The "unique" value will be used as reference in TheHive. Due to the fact, that I'm using the same value for all 4 events, the creation fails. By ensuring a real unique value everything will work. No issue anymore in my opinion, just something to be aware of.
Hello, I'm sorry for the late response. Did you figured how to fix the issue or understand the root cause? If it still relevant today for you, I can work on this during July 2024. Thank you
It's working by ensuring a unique value is present per row and the respective fieldname of this unique value is set in the alert action for "Unique ID field". No further action required, just to be aware of it. Thanks for your response & support!!
Request Type
Bug
Work Environment
Problem Description
If my Splunk Alert consists of multiple events (rows) and the alert setting is set to "ES notable mode" the TA should create one TheHive Alert for each row
Steps to Reproduce
Create a Splunk Alert
Run the Alert with Alert mode "ES notable mode" (1 alert per row). I tested the same with "Alert action mode" without a unique field.
Verify log output
Possible Solutions