Create sightings search configuration records
- UpdatedAug 1, 2024
- 4 minutes to read
- Xanadu
- Security Operations Integration Reference
Create multiple sightings search configuration records and use them while querying multiple log stores or varying the search parameters.
Before you begin
Role required: sn_si.admin
- The CIM add-on must be installed on the Splunk instance.
- Saved Searches and Inplace queries are supported for Splunk Integration only.
About this task
- Create custom searches that combine multiple event records.
- Design-efficient and effective searches.
- Use parametrized inputs in the Splunk saved search.
The base system includes the sample configurations as shown in this image:
To verify if the saved search configuration matches the configuration defined on your Splunk instance:
- Navigate to .
- Change App Context to All.
A list of search reports is displayed.
- Confirm that the saved search query is present in the list.
In your Splunk instance, define the saved search with the same name, Default Saved Search - Emails, and the same search parameters for the email address and email subject. If the name and search parameters are not the same, sightings search does not generate accurate result.
Procedure
Result
What to do next
After defining the search query, click Generate Sightings Search Test Query, and specify a list of observable values to generate a test query based on this saved search configuration.