Ingest alerts in Splunk Incident Intelligence 🔗
The following options are available for ingesting alerts in Incident Intelligence:
- Create a detector for one of the available alert sources in Splunk Observability Cloud to automatically pass alerts. See Available alert sources in Splunk Observability Cloud.
- Use the Splunk Incident Intelligence app on Splunkbase to send Splunk Enterprise and Splunk Cloud Platform alerts. See Available alert sources in Splunk Enterprise and Splunk Cloud Platform.
- Ingest third-party alerts using an ingest endpoint. See Available ingest endpoints for third-party alerts.
After alerts are ingested, you can view them on the Alerts tab of Incident Intelligence.
Alert source |
Documentation |
---|---|
Splunk APM |
|
Splunk Infrastructure Monitoring |
|
Splunk RUM |
See Create a detector. |
Splunk Synthetic Monitoring |
|
Alert source |
Documentation |
---|---|
Splunk Enterprise |
See Ingest alerts from Splunk Enterprise and Splunk Cloud Platform. |
Splunk Cloud Platform |
See Ingest alerts from Splunk Enterprise and Splunk Cloud Platform. |
Ingest endpoint |
Documentation |
---|---|
Amazon CloudWatch |
|
Azure Monitor |
|
Prometheus |
|
Generic REST alerts |
If you are setting up Incident Intelligence for the first time, next you need to create and configure an incident policy. See Create and configure incident policies.