Hi everyone,
I'm working on integrating Splunk Enterprise with Splunk SOAR using the Splunk App for SOAR Export, and I'm running into an issue where alerts sent from Splunk aren't appearing in SOAR.
Setup Details:
Using App-to-App connection (not direct API/port 443)
SOAR server is configured and marked active in the Splunk App for SOAR Export
SOAR user has the observer and automation roles
SSL verification is disabled (self-signed cert)
Splunk and SOAR are on the same VPC/subnet with proper connectivity
No events are appearing in SOAR
Nothing listed in Event Ingest Status or as Ad hoc search result
No errors in the Splunk Job Inspector
Are there any extra steps required in the new SOAR UI to allow data from Splunk’s App for SOAR Export?
Any known limitations or misconfigurations I might be missing?
Any guidance would be greatly appreciated!
Thanks in advance. 🙏
Create a Correlation Search in Splunk
Define the logic to detect specific patterns or threats.
Schedule the search to run periodically.
Set an Alert Action for the Correlation Search
Choose the action as Send to Phantom (Splunk SOAR).
Ensure proper configuration for communication between Splunk and Phantom.
Create a Label in SOAR (Phantom)
Create a label in SOAR that matches the label used in the Splunk alert.
This label helps route and categorize the incoming events properly.
Test the Workflow
Trigger the correlation search manually or wait for a scheduled run.
Verify that the alert is sent to Phantom and is processed with the correct label.
Refer the docs: