Get Splunk alerts into Squadcast

Follow the steps below to configure a service so as to extract its related alert data from Splunk. Squadcast will then process this information to create incidents for this service as per your preferences.

Using Splunk as an Alert Source

On the Sidebar, click on Services.

You can either choose to use existing service or create a new service

Now, click on the corresponding Alert Sources button.

Select Splunk from Alert Source drop down and copy the Webhook URL shown.

Create a Squadcast webhook alert in Splunk

In your Splunk dashboard, click on Search & Reporting under Apps.

Do the required search and then click on Save As and select Alert.

In the Save As Alert box, enter the title, description and other Trigger Conditions and under Trigger Actions, click on the Add Actions button and select Webhook and enter the webhook url from the previous step under URL and click the Save button.

That's it! The Splunk Integration is completed and whenever an alert is fired for your search query, an alert will get created in Squadcast as well.

Updated 7 months ago


Get Splunk alerts into Squadcast

Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.