Many people think of Splunk SOAR as a tool that pulls data from Splunk, but the reverse is also true:
Splunk (as a SIEM) can actively push alerts and events into SOAR, where they are automatically investigated, enriched, and responded to.
This bi-directional integration allows analysts to move seamlessly between detecting threats in Splunk and responding to them in SOAR.
Think of Splunk as the alert generator and SOAR as the response engine.
Let’s look at the two key integration mechanisms that let Splunk and SOAR work together:
This app is installed on the Splunk platform (not SOAR), and it enables:
Forwarding alerts from Splunk to SOAR:
Alerts from correlation searches or data models can be sent directly to SOAR as events.
These events then trigger playbooks automatically.
Viewing SOAR data inside Splunk:
The app includes dashboards that show:
Open SOAR cases
Automation timelines
Analyst decisions
This lets Splunk users track response progress without switching tools.
This app makes the integration feel native and seamless from the Splunk side.
The Adaptive Response Framework (ARF) is a Splunk Enterprise Security (ES) feature that lets you take action directly from search results.
Lets analysts right-click or select a field (e.g., an IP, username) in a notable event.
Choose a response action, such as:
“Send to SOAR for investigation”
“Run playbook: Quarantine Host”
“Request Enrichment from SOAR”
The chosen action sends the necessary data to SOAR (via REST API or app integration).
A playbook is triggered in SOAR to handle the response.
ARF empowers analysts to go from detection to action in one click.
Here’s what a typical integration workflow looks like:
Detection
Splunk runs a correlation search and detects suspicious activity.
A notable event is generated in Splunk Enterprise Security.
Forwarding
A custom alert action (from the SOAR app or ARF) sends the event to SOAR.
Data is sent via REST API with key fields like IPs, users, domains, etc.
Playbook Execution
SOAR ingests the event and launches a playbook.
The playbook enriches the data, checks threat intelligence, and performs actions.
Feedback Loop
SOAR can send:
Enrichment results (e.g., IP is malicious).
Case updates (e.g., investigation closed).
Back to Splunk, where it can be:
Logged
Shown in dashboards
Used to update notable events
This tight integration creates a closed-loop security operations workflow.
This integration unlocks many real-world security automation scenarios:
Use Splunk searches (e.g., “User logged in from 2 countries in 5 minutes”) to:
Automatically send the event to SOAR.
Trigger a prebuilt investigation playbook.
Reduces time to triage and supports consistent response procedures.
Once SOAR is triggered, it can:
Disable compromised user accounts.
Block malicious IPs at the firewall.
Notify stakeholders or start case management.
This turns manual actions into automatic remediation.
Dashboards in the Splunk SOAR App let analysts:
See case progress and status.
Understand which actions were taken.
Follow automation timelines.
This provides end-to-end visibility without switching tools.
| Feature | Description |
|---|---|
| Splunk App for SOAR | Sends alerts to SOAR and shows SOAR data in Splunk |
| Adaptive Response Framework | Allows manual triggering of SOAR playbooks from search results |
| Detection to Response Flow | Splunk detects → Sends to SOAR → SOAR investigates → Sends results back |
| Use Case: Auto-Triage | Use correlation rules to launch playbooks |
| Use Case: Auto-Remediation | Automatically block IPs, disable accounts, escalate incidents |
| Use Case: Case Visibility | View SOAR case progress and resolution inside Splunk dashboards |
What is a Custom Alert Action?
In Splunk, a Custom Alert Action is a mechanism that allows search results to be sent to external systems — in this case, to Splunk SOAR — for further automated processing.
Configuration Steps:
Go to Splunk Enterprise Security.
Under Content Management, select a Correlation Search.
Edit the search and add an Alert Action.
Choose one of the following (depending on app version):
Send to Phantom
Run Playbook
Configure the destination SOAR asset, playbook (optional), and parameters if required.
Default Fields Sent to SOAR:
event_id
host
user
source_ip
dest_ip
timestamp
Other relevant search result fields
How these are used in SOAR:
These values are packaged as CEF-formatted artifacts and attached to a container representing the incoming event.
How Splunk Data Arrives in SOAR:
Data is sent from Splunk using:
The SOAR app on Splunk (uses REST API)
Adaptive Response Framework (ARF) (via manual analyst action)
SOAR receives this as a container, with structured data inside artifacts
How the Structure Works in SOAR:
The event becomes a container (a unit of investigation).
Each field from the Splunk result becomes part of an artifact in the container.
Example:
source_ip → cef.sourceAddress
username → cef.destinationUserName
Field Mapping Recommendation:
Use Splunk's Common Information Model (CIM) fields wherever possible.
Ensures compatibility with existing playbooks and enrichments inside SOAR.
On the Splunk Side:
Users must have permissions to run alert actions that send data to SOAR.
API calls must be authenticated:
Best practice: Use API tokens
Alternative: Splunk Secure Gateway
On the SOAR Side:
You must configure a Splunk Asset that:
Accepts API-based connections
Specifies allowed authentication method (Basic Auth or Token)
Has the correct port open (default for API is 443 or 8443 depending on setup)
Security Recommendations:
Restrict API tokens to least privilege — allow only necessary playbooks or containers.
Use HTTPS for encrypted data transmission.
Log all API interactions — helpful for audit trails or detecting misuse.
After SOAR processes the event, it can send results back to Splunk to complete the lifecycle.
Examples of Feedback Actions:
Write back to a summary index in Splunk:
Update the status of a notable event (e.g., from “New” to “Resolved”).
Add metadata like:
Tags
Risk scores
Comments or resolution details
Example:
| inputlookup phantom_results.csv | eval status="Resolved"
Purpose:
This integration ensures full visibility and traceability — from detection to response to documentation — all within the analyst’s SIEM dashboard.
A brief FAQ-style section can help tackle real-world issues that also appear in exams:
Issue: SOAR is not receiving events from Splunk
Issue: Playbook did not trigger after ingestion
Check:
Is there a default playbook assigned to the container label?
Are event labels mapped properly?
Is playbook trigger mode set to “on ingestion”?
Issue: Incomplete or missing data in SOAR
Check:
Are fields properly mapped in the Splunk alert action?
Is the payload JSON-formatted and valid?
Are all required fields present and structured under cef?
| Topic | Details |
|---|---|
| Custom Alert Action | Sends Correlation Search results from Splunk to SOAR as structured events |
| Artifact Mapping | Splunk fields are mapped to SOAR artifacts (e.g., cef.sourceAddress) |
| Authentication | Use API tokens with least privilege; secure communication with HTTPS |
| Feedback Mechanism | Send results from SOAR back to Splunk (update notable, write to index) |
| Troubleshooting | Validate playbook triggers, data mapping, and Splunk-SOAR connectivity |
How does Splunk Enterprise Security integrate with Splunk SOAR?
Splunk Enterprise Security sends notable events to SOAR, where they are converted into containers for automated investigation.
When a correlation search in Splunk Enterprise Security detects suspicious activity, it generates a notable event. Through the integration framework, these events are forwarded to the SOAR platform. SOAR converts them into containers containing artifacts and contextual data. Automation playbooks can then analyze and respond to the incident automatically, reducing manual investigation workload.
Demand Score: 80
Exam Relevance Score: 90
What role does the Splunk App for SOAR Export play in integration?
The app facilitates communication between Splunk Enterprise and the SOAR platform for sending security events and contextual data.
The Splunk App for SOAR Export enables Splunk Enterprise to send data to SOAR through predefined workflows. It handles formatting, transmission, and mapping of events so they can be processed correctly by SOAR automation workflows. This integration allows security alerts generated in Splunk to trigger automated investigation and response actions.
Demand Score: 73
Exam Relevance Score: 86
Why might a playbook execute a Splunk search?
Playbooks run Splunk searches to retrieve additional investigation data from indexed logs and analytics results.
During an investigation, automation workflows may require historical log data or contextual information stored in Splunk Enterprise. By executing searches, playbooks can gather additional intelligence such as related events, user activity, or network traffic patterns. This enrichment helps analysts understand the broader context of an incident and supports automated decision logic.
Demand Score: 69
Exam Relevance Score: 83
Why is bidirectional communication important between Splunk and SOAR?
Bidirectional communication allows SOAR to both receive events from Splunk and send investigation results or actions back to the platform.
After SOAR processes an incident, it may generate investigation outcomes such as risk classifications or remediation actions. Sending this information back to Splunk allows analysts to view investigation progress directly within the analytics platform. This integration ensures that both platforms maintain synchronized visibility into incident response activities.
Demand Score: 65
Exam Relevance Score: 80
What advantage does SOAR integration provide for SOC workflows?
Integration enables automated investigation and response actions to be triggered directly from security analytics events.
Without SOAR integration, analysts must manually review alerts and perform investigation steps. Integration allows detection systems to automatically trigger automation workflows that enrich alerts, gather context, and execute remediation actions. This significantly reduces response time and improves the efficiency of security operations.
Demand Score: 63
Exam Relevance Score: 84