Hi,
I am looking to chain a couple of custom alert actions. A use case is monitoring a node that is down.
When down, alert action #1 is triggered and pings the node as verification.
If the node is indeed down, then alert action #2 is triggered that will cut a ticket.
Action #2 is already existing so I'm just looking to re-use it.
I'm thinking of calling the 2nd alert action using REST (assuming there's an endpoint to fire an alert).
I appreciate any info.
Thanks
Within splunk natively that is not possible. alert actions attached to a search are triggered in a bucket of asynchronous actions with no interdependence.
Writing your own chaining might be possible but complicated.
This is exactly the use case for Phantom and using Phantom in the non-security role. Send the alert to Phantom and handle the rest of the logic there.
However, I have to disagree with the assertion above. there are many ways to address this in Splunk directly. To do this you need to create a state table of some sort in Splunk and look for results.
There are many ways you can do this directly from an alert. Some examples are...
- Update a lookup table to run in your search
- Create an entry in the triggered alert index and monitor that.
- Add a Splunk index entry directly and monitor that
If we use an index, the process could look like this...
Within splunk natively that is not possible. alert actions attached to a search are triggered in a bucket of asynchronous actions with no interdependence.
Writing your own chaining might be possible but complicated.