Set up custom episode actions in ITSI
Unique use cases can require custom alerting functionality and integration. In addition to the default actions you can take on an episode, ITSI also lets you define custom alert actions in notable_event_actions.conf.
- Only users with file system access, such as system administrators, can set up custom episode actions.
- Review the steps in How to edit a configuration file in the Admin Manual.
Never change or copy the configuration files in the default directory. The files in the default directory must remain intact and in their original location. Make changes to the files in the local directory.
- Open or create a local version of
- Add a stanza for the action you want to perform. For example:
disabled = 0to enable the custom action.
[itsi_sample_event_action_ping] disabled = 0
For an example configuration, see notable_event_actions.conf.example.
Setting up custom alert actions via
notable_event_actions.conf only allows for a one-way integration. The episode will not contain a drilldown link to the action that was performed.
Integrate ITSI with Splunk SOAR (On-premises)
Overview of the ITSI Rules Engine
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.5.0 Cloud only, 4.5.1 Cloud only, 4.6.0 Cloud only, 4.6.1 Cloud only, 4.6.2 Cloud only, 4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.8.0 Cloud only, 4.8.1 Cloud only, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4, 4.9.5, 4.9.6, 4.10.0 Cloud only, 4.10.1 Cloud only, 4.10.2 Cloud only, 4.10.3 Cloud only, 4.10.4 Cloud only, 4.11.0, 4.11.1, 4.11.2, 4.11.3, 4.11.4, 4.11.5, 4.11.6, 4.12.0 Cloud only, 4.12.1 Cloud only, 4.12.2 Cloud only, 4.13.0, 4.13.1, 4.13.2, 4.14.0 Cloud only, 4.14.1 Cloud only, 4.14.2 Cloud only, 4.15.0, 4.16.0 Cloud only
Feedback submitted, thanks!