Skip to main content

 

Splunk Lantern

Alerts data

 

Alerts data refers to the digital records generated by software systems or security tools to notify users or administrators about significant events, conditions, or anomalies that require attention. These records are triggered when predefined thresholds, rules, or patterns are detected, often indicating errors, warnings, policy violations, performance issues, or security threats.

Key characteristics of alerts data include that it is: 

  • Event-driven: Generated in response to specific triggers or rules.
  • Actionable: Intended to prompt investigation or remedial action.
  • Timestamped: Include date and time for incident tracking.
  • Categorized: Often classified by severity (for example, informational, warning, critical).
  • Detailed: Contain information about the source, nature, and context of the event.

Alerts data typically includes:

The Splunk Common Information Model (CIM) add-on contains an Alerts data model with fields and tags that describe the alerts produced by alerting systems, such as Nagios or NetCool, for use in Splunk correlation searches or dashboards. They are not to be used to describe Splunk Alerts or Notable Events, which are already modeled in other contexts.

Before looking at documentation for specific data sources, review the Splunk Docs information on general data ingestion: