Search in Splunk Mission Control
Explore the data in Splunk Mission Control and investigate raw events related to incidents by searching in Splunk Mission Control.
Select Search in the Splunk Mission Control menu bar or the Search tab while investigating an incident to start searching.
To process incidents, Splunk Mission Control adds searches on the Splunk Enterprise Security (Cloud) notable event index.
Splunk Mission Control does not duplicate searches from Splunk Enterprise Security (Cloud).
Search your tenant
Search data in your Splunk Mission Control tenant using the Search Processing Language (SPL).
You can only see data for incident types that you have access to. For more details about access control based on incident type, see Manage roles and capabilities for users of Splunk Mission Control.
For example, to search for critical incidents with a sensitivity level of white or green, use this search:
| mcincidents | search sensitivity="Green" OR sensitivity="White"
For additional details and example searches when searching incidents, see Search with incident data in Splunk Mission Control.
You can also search with tokens using the $token_name$
syntax. See Add tokens in response templates to learn more about tokens in Splunk Mission Control.
To learn more about searching with SPL, see the Splunk Enterprise Search Reference manual.
Use search macros in Splunk Mission Control
Search macros are reusable chunks of SPL that you can insert into other searches. You can use the following search macros in Splunk Mission Control.
mc_incidents
Use the mc_incidents
macro to return all unsorted incidents with Splunk Enterprise Security (Cloud) data.
For example, use the following search to find and sort all incidents with a specific search ID.
| `mc_incidents` | search id="value" OR name="value" OR description="value" | sort field2 | eventstats count as total_incidents_count
mc_incident_by_id(incident_id)
Use the mc_incidents_by_id
macro to return a specific incident with the corresponding Splunk Enterprise Security (Cloud) data.
For example, use the following search to find a specific incident based on the incident ID.
|`mc_incident_by_id(incident_id)`
You can supply a quoted string separated by commas in order to search for multiple incidents at the same time.
|`mc_incident_by_id("<incident ID>,<incident ID>,..,<incident ID>")`
add_events(incident_id)
Use the add_events
macro to add multiple events to an incident in Splunk Mission Control. Add the macro to the end of a search.
You can run a search to add particular events to an incident. For example, to add events with a source IP of 192.168.1.8
from your chosen index, use the following search:
index=<index_name> | search src="192.168.1.8" | `add_events(incident_id)`
To add events to an incident using the add_events macro, you must run a search that produces Events
results. To ensure that your search produces Events results, do the following:
- Include an event-generating command, such as
search
, in your search. You can add transforming commands, such asstats
, in addition to an event-generating command, but the SPL that follows the transforming command isn't included in the SPL added to the incident.Some commands, such as
For more information on search command types and to see which ones generate events, see Generating commands in the Splunk Enterprise Search Reference manual.makeresults
, synthesize results without actually producing Events results. You can't use these commands to add events to an incident. - Run the search in Verbose mode. Searches run in Smart mode or Fast mode don't produce Events results and don't add any events to an incident.
If you choose to use the full syntax for add_events
instead of the macro, ensure to use the following syntax.
| sendalert add_events param.incident_id=<incident_id>
Following the previous example of using the add_events macro, to add events with a source IP of 192.168.1.8 from your chosen index, use the following search.
index=<index_name> | search src="192.168.1.8" | sendalert add_events param.incident_id=<incident_id>
After you add events to an incident using the add_events macro, you can find them on the Events tab of your incident investigation. Adding events to an incident in Splunk Mission Control also adds the events in Splunk SOAR (Cloud). In Splunk SOAR (Cloud), you can find the newly added events on the Investigation page and continue to investigate them there. See Manage the status, severity, and resolution of events in Splunk SOAR (Cloud) in the Use Splunk SOAR (Cloud) manual.
If you run a search that produces events with missing indexer location values, you can still add the events to an incident. For example, events produced using a transaction command don't have _cd
or _bkt
values. If you add these events to an incident, Splunk Mission Control automatically adds them to the mc_events index associated with the incident.
For more information on events, including how you can add a single event from a search to an incident, see Add an event to an incident.
Use the custom search command in Splunk Mission Control
You can use the mcincidents
custom search command in Splunk Mission Control to learn more about incidents. Custom search commands are Splunk Search Processing Language (SPL) commands that extend SPL to serve your specific needs. Although Splunk software includes an extensive set of search commands, these existing commands might not meet your exact requirements. Custom search commands let you complete additional data analysis.
You can use the following options with mcincidents
.
Field | Type | Description |
---|---|---|
incident_type | String | The incident type for which incidents are retrieved. |
limit | Integer | The number of items to retrieve. |
fields | String | Comma-separated list of fields to retrieve. |
unwind_to | String | List events of a certain type with one row per field to provide a clearer reading experience. Valid types are response plan, phase, and task. |
query | JSON | JSON dictionary of conditions supported by KV store. Do not use conditions with status, assignee, urgency, or disposition. |
add_response_stats | Boolean | Add additional columns in response plans. |
per_incident_type_sort | JSON | JSON dictionary of sort parameters supported by KV store. |
Custom search command example searches
See the following searches for examples of how to use the mcincidents
custom search command.
To make the incident names appear in the search results table instead of in the row expansion, select the name
check box for any of the incidents.
List incidents by incident ID
To list incidents by their ID, use this example search.
| mcincidents query={"id": "incident_id"}
List incidents based on ID, name, summary, and response plans
To list incidents based on specific fields such as ID, name, summary, or response plans use this example search.
| mcincidents fields=id,name,summary,response_plans
Available open intelligence sources for Splunk Mission Control | Search with incident data in Splunk Mission Control |
This documentation applies to the following versions of Splunk® Mission Control: Current
Feedback submitted, thanks!