You can create notifications about incoming Kaspersky CyberTrace service events by configuring alert rules.
To create notifications about service events from Kaspersky CyberTrace in Splunk:
sourcetype="kl_cybertrace_events" alert="KL_ALERT_ServiceStopped"
This condition defines the request for searching alert events that are generated when Feed Service is stopped.
) to make sure that the specified request is performed correctly.
KL_ALERT_ServiceStopped events

Saving alert
The Save As Alert window opens.
You can specify any title.
You can specify any description.

The Save As Alert window
The rule will now appear in Splunk.