
Custom Event Ingestion via Splunk Enterprise - Custom Query
Details
This workflow searches for network detections events in a Splunk Enterprise tenant based on a custom search query (see template) and ingest them in the XDR Data Analytics Platform (detection findings) for incident generation. It is designed to run every X minutes (default 5) via a schedule rule
Description
Installation and Configuration Instructions
-
Install the Workflow
- Ensure you have the Splunk Enterprise integration enabled in XDR.
- Install the workflow from XDR automate Exchange.
- Set the Input variables
-
Automate the Workflow
- When prompted to "Automate it," add a scheduled automation rule or add it later.
- The interval has to match the one configured in the input variable "Workflow Run Interval"
-
Validate your custom search
- Edit the workflow and disable the automation rule until you have completed this step
- In your Splunk tenant, go to the “Search and Reports” section and test your custom search query (input variable: Splunk Custom Search Query)
- Make sure all mapped fields are filled in correctly; if not, correct the Splunk query
- If the Splunk query is correct, enable the automation rule
-
Expected behavior
- Workflow transforms each collected logs into a Custom Security Event
- Events are stored as Detection Findings
- Findings automatically participate in:
- Correlation
- Incident generation
-
Verification
- Navigate to Detection Findings Viewer in Cisco XDR
- Confirm that:
- Events are being ingested as Detection Findings
- Detection Findings may be correlated into Incidents
Required targets
This workflow requires the following targets to be available before it can be run.
Integration targets
- Splunk Enterprise
- Cisco XDR
About
Author
Ivan Berlinson
Version
v1.1
Intent
Custom Security Event
Integration
Average rating
No ratings yet
Authorship
Community
Contact and support information
External links
Related workflows
Cisco Managed
This incident response workflow allows you to export a summary of an XDR incident to a Splunk Enterprise index from a playbook or using an automation rule.
Community
This workflow searches for events in a Splunk Enterprise instance and creates a new Cisco XDR incident (via private intelligence) or updates an existing one created by a workflow.
Cisco Managed
This workflows exports XDR detection findings to Splunk Enterprise every 5 minutes using a schedule automation rule.