@RockWarriorP The user interface is not meant to be modified, and the fields provided by the alerts/fire_alerts/{name} endpoint are document here: <https://docs.splunk.com/Documentation/Splunk/8.2.6/RESTREF/RESTsearch#alerts.2Ffired_alerts.2F.7Bname.7D>: actions Any additional alert actions triggered by this alert. alert_type Indicates if the alert was historical or real-time. digest_mode expiration_time_rendered savedsearch_name Name of the saved search that triggered the alert. severity Indicates the severity level of an alert. Severity level ranges from Info, Low, Medium, High, and Critical. Default is Medium. Severity levels are informational in purpose and have no additional functionality. sid The search ID of the search that triggered the alert. trigger_time The time the alert was triggered. trigger_time_rendered triggered_alerts Have you looked at Splunk IT Essentials Work, Splunk IT Service Intelligence, or Splunk Enterprise Security as more robust solutions, depending on your use cases? You might also consider developing your own alert dashboards or using a third-party solution like Alert Manager (not an endorsement).
... View more