Hello,
I am running into an issue with the Resilient Integration for Splunk and Splunk ES app for Splunk. The app contains a file called alert_actions.conf which appears to be used to control manual adaptive response actions. Our organization has multiple alerts which do not always have the same field names. For example, depending on an alert, the user field could be $result.user1$ or $result.user2$, etc. Right now I am setting multiple Splunk field names to be mapped to a single Resilient field, then I am parsing our the extra pieces through python scripting in the Resilient platform. Is there a better way to do this? I know I can get this to work through correlation searches automatically, but we are sending events to Resilient manually so this will not work. Has anyone got this working or knows of a way to get this to work? (maybe multiple alert_actions.conf that can be determined based on a condition in an alert?).
------------------------------
Alex
------------------------------