A minimal Splunk App that provides a custom alert action for AI-powered severity assessment. It includes a simple log server for sending events to Splunk, and a saved search which triggers the custom alert when suspicious activity is detected.
- In
./bin/log_server.pyupdate credentials to ensure the server can connect to your Splunk instance and run the script either in or outside your Splunk environment. - In
./default/savedsearches.confsetenableSched = 1to enable the saved search to run every minute. - Wait for the saved search to run and see if the
threat_level_assessmentcustom alert has been triggeredindex="main" sourcetype="ai_custom_alert_app:threat_log" - Search
index="main" sourcetype="ai_custom_alert_app:assessment"to verify results of the AI severity assessment
- Look for all events sent from this app
`index="main" sourcetype="ai_custom_alert_app:*"`
- Look in splunkd logs
index="_internal" source="/opt/splunk/var/log/splunk/splunkd.log" ai_custom_alert_app