Docs » Ingest alerts in Splunk Incident Intelligence

Ingest alerts in Splunk Incident Intelligence 🔗

To ingest alerts in Incident Intelligence, you can create a detector for one of the available alert sources to automatically pass alerts into Incident Intelligence or you can ingest third-party alerts using an ingest endpoint. After alerts have been ingested, you can view them on the Alerts tab of Incident Intelligence.

Available alert sources in Splunk Observability Cloud

Alert source

Documentation

Splunk APM

See Create detectors to trigger alerts.

Splunk Infrastructure Monitoring

See Create detectors to trigger alerts.

Splunk RUM

See Create a detector.

Splunk Synthetic Monitoring

Available ingest endpoints for cloud alerts

Ingest endpoint

Documentation

Amazon CloudWatch

See Ingest Amazon CloudWatch alarms.

Azure Monitor

See Ingest Azure Monitor alerts.

Prometheus

See Ingest Prometheus alerts.

Next step

If you are setting up Incident Intelligence for the first time, next you need to create and configure an incident policy. See Create and configure incident policies.