Splunk Event Query activity The Splunk Event Query workflow activity searches the Splunk event logs for malicious indicators. The Splunk Event QueryActivity activity can be used with any workflow to search the Splunk event logs. Results Possible results for this activity are: Table 1. Results Result Description Success Splunk Failure An error occurred while attempting to verify Splunk query. More error information is available in the activity output error. Input variables Input variables determine the initial behavior of the activity. Variable Description user User name for the Splunk system. password Password for the Splunk system. observables The list of observables from Trusted Security Circles or the security incident task to search for. Returned in JSON format. base_url URL of the Splunk integration endpoint. link_base_url Link to the Splunk web interface, when available. source Source of the request to run the workflow. Supported inputs are: Trusted Security Circles or security incident task. max_rows Maximum rows to return from the query. The limit depends on the third-party integration. days_to_search Days to search from the current day backwards. Default is 7. query Search syntax. $(observable) is the default. Output variables The output variables contain data that can be used in subsequent activities. Table 2. Output variables Variable Description output Output of the query in JSON format. Capability Execution Tracking - Failure activityThe Capability Execution Tracking - Failure workflow activity records a failure to the audit record.