You can create notifications about incoming Kaspersky CyberTrace service events by configuring alert rules.
To create notifications about service events from Kaspersky CyberTrace in Splunk:
sourcetype="kl_cybertrace_events" alert="KL_ALERT_ServiceStopped"
This condition defines the request for searching alert events that are generated when Feed Service is stopped.
KL_ALERT_ServiceStopped events
Saving alert
The Save As Alert window opens.
You can specify any title.
You can specify any description.
The Save As Alert window
The rule will now appear in Splunk.