awurster / splunk-add-on-jira-alerts

Splunk custom alert action for Atlassian JIRA

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

JIRA Alert Add-on

Introduction

This add-on allows Splunk to create JIRA issues as an alert action.

This add-on was produced as part of the Developer Guidance project. Read our guide to learn more about creating custom actions that can be performed when an alert triggers.

Installation

Once the app is installed (through Splunkbase, Install app from file, or by copying this directory to the etc/apps/ directory of your Splunk installation), go to the app management page in the Splunk interface. Click Set up in the JIRA Ticket Creation row. Fill out the required attributes for your JIRA installation and you are ready to go.

To add a JIRA action to an alert, go to the Alerts tab in the Search app and find the alert for which you want to add JIRA tickets. Click Edit, and select Edit Actions. Click + Add Actions and select JIRA. Fill out the attributes for the artifact you wish to create in JIRA when the associated search returns results, and Splunk will start logging bugs for you.

Case Study

For a case study showcasing the application of this custom alert action, see the Splunk Reference App - PAS and the accompanying Splunk Developer Guidance

License

The Splunk Add-on for Atlassian JIRA Alerts is licensed under the Apache License 2.0. Details can be found in the LICENSE page.

About

Splunk custom alert action for Atlassian JIRA


Languages

Language:Python 86.9%Language:HTML 9.5%Language:Shell 3.6%