Correlation searches are scheduled SPL (Search Processing Language) queries that analyze data across one or more sources to detect suspicious patterns or behaviors. When these patterns are found, the search can generate a Notable Event or take other automated response actions.
Unlike standard searches in Splunk, correlation searches are designed for real-time detection, alerting, and integration with security workflows.
Writing effective correlation searches requires a strong command of SPL. Searches should be:
Efficient: Use tstats or accelerated data models when possible.
Specific: Avoid overly broad criteria that create noise.
Modular: Include tokens and macros for reusability.
Common SPL commands used in correlation searches:
eval: Create new calculated fields (e.g., eval risk_score = severity * 2)
stats: Aggregate or summarize data (e.g., stats count by user)
transaction: Group related events into a single logical event
lookup: Enrich data using external files or identity mappings
join: Combine data from different sources (used sparingly for performance)
Example Search Logic:
| datamodel Authentication Authentication search
| search action="failure"
| stats count by user, src
| where count > 5
This search detects users with more than five failed logins and flags them as suspicious.
Splunk ES provides a dedicated Correlation Search Editor to help configure and manage all aspects of your search.
Key settings in the editor include:
Severity: Impacts the risk score and visibility (e.g., Informational, High)
Urgency: Affects how alerts are prioritized in Incident Review (e.g., Low, Critical)
Category: Helps group searches by function (e.g., Access, Malware, Policy Violation)
You also define the Notable Event’s:
Title and Description: You can use tokens like $user$, $src$ to dynamically insert values.
Adaptive Response Actions:
Send an email to the SOC team
Create a ticket in a service desk system
Adjust a user’s or asset’s risk score
Trigger a script or webhook
These settings are vital for integrating detection with response workflows.
Strong correlation searches don't operate in isolation — they work with other ES components.
Lookup Files:
Threat Intelligence:
Identity Context:
Tags and Event Types:
These integrations improve both the accuracy and value of alerts.
Before publishing any correlation search:
Run the SPL in the Search & Reporting App.
Validate:
Does the search return meaningful results?
Is the time range appropriate?
Are all required fields extracted correctly?
Testing avoids pushing noisy or broken logic into production.
Located under Configure > Content Management in Splunk ES.
Shows a complete list of all correlation searches, risk rules, and key settings.
Helps track:
Search performance
Run schedule
Last triggered time
Associated response actions
This dashboard is essential for governance and audit of your detection logic.
| Component | Description |
|---|---|
| SPL Search Logic | Use eval, stats, lookup, transaction, and datamodel queries |
| Correlation Search Editor | Set severity, urgency, response actions, and dynamic event details |
| Integration Elements | Link with threat intel, lookups, and identity info for context |
| Testing Process | Always test searches in the Search app before deployment |
| Content Management | Use dashboards to review and monitor all correlation search assets |
When designing a correlation search, it’s not just about detecting suspicious activity — it’s also about ensuring compatibility with CIM and ES dashboards.
Correlation searches often rely on event types (defined in eventtypes.conf) and tags (defined in tags.conf) to categorize events.
These mappings allow the Splunk Common Information Model (CIM) to understand and classify raw data.
Without them, events may not populate dashboards like the Security Posture Dashboard or Glass Tables, and correlation rules may miss critical matches.
Always define an eventtype for key event classes (e.g., failed_logins)
And apply appropriate tags (e.g., tag=authentication)
Then register the eventtype in the CIM data model, either via the UI or eventtypes.conf
adaptive_response_actions.confSplunk ES provides the ability to trigger Adaptive Response Actions (ARAs) from within correlation searches, such as sending an email, creating a ticket, or calling an external script.
While these actions are configured in the ES UI, they are powered by backend files.
adaptive_response_actions.confThis configuration file defines:
The available action types
Associated scripts or REST calls
Required permissions and display names
Which parameters are needed (e.g., destination IP, user name)
If you're developing a custom adaptive action (e.g., isolate a host via firewall API), you must:
Register the action in adaptive_response_actions.conf
Deploy supporting logic in the TA directory (usually under bin/)
Ensure metadata permissions (default.meta) allow global access
This configuration ensures the action appears in:
Configure > Adaptive Response Actions
…and is callable from any correlation search.
These three components control when a correlation search runs, what time span it examines, and how often it’s allowed to alert.
| Component | Description |
|---|---|
| Schedule (cron) | Defines when the search runs (e.g., every 5 minutes) |
| Earliest/Latest | Defines the time window of data the search looks at (e.g., -5m to now) |
| Throttle | Prevents repeated alerts for the same entity within a given timeframe |
Schedule: Every 5 minutes
Time Window: earliest=-5m latest=now
Throttle Field: user
Throttle Period: 30m
This means the search runs every 5 minutes, checking the last 5 minutes of data, but will suppress duplicate Notable Events for the same user if triggered within a 30-minute window.
This configuration avoids:
Overlap issues (e.g., searching 60 minutes every 5 minutes → overload)
Repeated alerts (noisy false positives)
Under-alerting (if throttle is too aggressive)
| Area | Added Insight |
|---|---|
| Event Type Registration | Shows how to align correlation logic with CIM to populate ES content |
| Adaptive Response Actions | Explains backend file-based management (adaptive_response_actions.conf) |
| Schedule vs. Time Range Logic | Clarifies how correlation search timing and throttling mechanisms interact |
What is a correlation search in Splunk Enterprise Security?
A correlation search is a scheduled SPL query designed to detect suspicious activity and generate notable events.
Correlation searches analyze indexed security data for patterns that indicate potential threats. When the search conditions are satisfied, ES generates a notable event and sends it to the Incident Review dashboard. These searches form the core detection mechanism within Splunk ES.
Demand Score: 90
Exam Relevance Score: 91
What components are typically defined when creating a correlation search?
Administrators define the SPL query, scheduling settings, severity level, and adaptive response actions.
The SPL query identifies suspicious patterns in the data. Scheduling determines how frequently the detection runs. Severity indicates the risk level associated with the detection, and adaptive responses define automated actions triggered when the detection occurs.
Demand Score: 86
Exam Relevance Score: 88
What is the function of adaptive response actions in Splunk ES?
Adaptive response actions automatically trigger workflows such as ticket creation, alert notifications, or automated containment tasks.
When a correlation search generates a notable event, adaptive responses can execute predefined actions. Examples include sending alerts to security teams, updating risk scores, or integrating with external incident management systems. These responses help automate security operations and accelerate incident handling.
Demand Score: 80
Exam Relevance Score: 86
Why should correlation searches be tested before deployment?
Testing ensures the detection logic correctly identifies suspicious activity without generating excessive false positives.
Administrators typically run the SPL query against historical data to validate the detection behavior. Testing helps confirm that the search logic captures intended threat patterns while avoiding benign activity. This step prevents operational disruption caused by noisy alerts.
Demand Score: 78
Exam Relevance Score: 84
What happens when a correlation search triggers a detection?
The search generates a notable event that appears in the Incident Review dashboard.
The notable event includes contextual information such as severity, affected assets, and detection rule details. Analysts use this information to evaluate and investigate the potential security incident. The event may also trigger automated adaptive response actions depending on configuration.
Demand Score: 76
Exam Relevance Score: 82
What risk occurs if correlation searches are poorly designed?
Poorly designed searches may fail to detect threats or generate excessive false positives.
Detection rules must balance sensitivity and accuracy. If the search conditions are too broad, the system generates many unnecessary alerts. If the conditions are too restrictive, legitimate threats may go undetected. Effective detection engineering requires continuous testing and refinement.
Demand Score: 75
Exam Relevance Score: 83