Alerting

Alert Action Log Event

seceontest
New Member

Hello Everyone,
Is there a way to utilize the new fields extracted from logs that Splunk intakes and use in the alert action log event side and make the alert event log more dynamic?

sample splunk intake log :- {\"event_type\":\"FAILED_LOGIN\",\"event_id\":\"f0836a4a-9e4a-4914-b52c-010ecb0916f8\",\"type\":\"event\",\"created_at\":\"2020-11-13T21:30:09+05:30\",\"created_by\":{\"login\":\"\",\"type\":\"user\",\"id\":\"2\",\"name\":\"Unknown user\"},\"source\":{\"login\":\"rahulmishra1329@gmail.com\",\"type\":\"user\",\"id\":\"14044224420\",\"name\":\"Rahul Mishra\"},\"session_id\":null,\"additional_details\":null,\"action_by\":null,\"ip_address\":\"117.211.192.31\"}

new field extracted :- event_type

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...