Multiple Splunk alerts create security incidents with the same short descriptionIssue <!-- div.margin { padding: 10px 40px 40px 30px; } table.tocTable { border: 1px solid; border-color: #e0e0e0; background-color: #fff; } .title { color: #d1232b; font-weight: normal; font-size: 28px; } h1 { color: #d1232b; font-weight: normal; font-size: 21px; margin-bottom: 5px; border-bottom-width: 2px; border-bottom-style: solid; border-bottom-color: #cccccc; } h2 { color: #646464; font-weight: bold; font-size: 18px; } h3 { color: #000000; font-weight: bold; font-size: 16px; } h4 { color: #666666; font-weight: bold; font-size: 15px; } h5 { color: #000000; font-weight: bold; font-size: 13px; } h6 { color: #000000; font-weight: bold; font-size:14px; } ul, ol { margin-left: 0; list-style-position: outside; } --> After downloading and configuring the Splunk app ServiceNow Security Operations Addon, when multiple alerts are triggered in Splunk, multiple security incidents are created on the instance. The multiple security incidents have a short description and/or description that matches the first alert even though in Splunk the values of the fields that map to the short description and/or description are different. ReleaseAll releases.CauseOn the Splunk app, it's possible that static values are being sent to the ServiceNow instance through the When triggered form, the Correlation Search > Search field, or through the Title and/or Description fields of the Adaptive Response Actions > Create Multiple ServiceNow Security Incidents. ResolutionYou can enter static default values in the When triggered form. But, for multiple-incident creation, don't use the When triggered form to do the mapping. For dynamic data that you want to map to ServiceNow for multiple security incidents, do the mapping inside the Search field under Correlation Search, using eval. Sample Search field value: index=* | eval description= "time: " + _time + " date: " + short_description + " subject: " + description + " sender: " + host | table description The left side of the assignment operator '=' should match the field name on the ServiceNow staging table, also called the import table. The right side of the assignment operator '=' should be the Splunk field name. Also, in the Create Multiple ServiceNow Security Incidents section under Adaptive Response Actions, make sure that the Title or Description fields do not have values. If these fields have values, the multiple security incidents on the ServiceNow instance will have a short description (Title) and/or Description matching the first alert.