- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
04-09-2024 03:04 AM
We fetch incident with Splunk Add-on. What should I do to enrich and map it? How can I run the mapper here? or do I need to proceed with setincident commands?
#SplunkAddon
04-09-2024 08:46 AM
Hello!
For 6.X versions, You can map these alerts by going to object Setup->Incidents and clicking on three dots on the top right and selecting API endpoint mapping and then selecting the splunk addon option there.
If you are on the newer versions, the same option is found on the classifiction and mapping page.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!