I have some security devices that are sending logs to my Splunk server. I'd like to have a script on the Splunk server that kicks off each time it receives an alert from my device.
Security device is sending alerts to my Splunk server.
The script will examine each alert as it comes in.
Based on the contents of the alert it will either ignore it (low priority alert) or forward it to a regional contact for remediation (high priority alert)
Yes. This is a very standard use case for Splunk.
Create a search that runs real-time or at an interval that will pull the high priority alerts, save the search as an alert, and set the alert action to Run A Script.
Keep in mind the scripts will be running every instance on the search if realtime not only when the search matches the result. So proper logic should be present to avoid null emails to the destination.