Enhance your Splunk instance by connecting it to the power of Ansible automation. This add-on provides a custom alert action that sends critical events from Splunk directly to the Red Hat Ansible Automation Platform. With this integration, you can automatically trigger Ansible rulebooks and playbooks in response to security threats or operational issues. Requirements: - The Red Hat Event-Driven Ansible Add-on for Splunk (this app) - Ansible Automation Platform with an active Event-Driven Ansible Controller to receive events and launch automations. Use Cases: 1. Custom Alert Action triggered by a saved search in Splunk Core and Splunk Enterprise Security (ES). 2. Episode Action called in the Episode Review page of Splunk IT Service Intelligence (ITSI)
(0)
Categories
Created By
Source Code
Type
Downloads
Licensing
Splunk Answers
Resources