You can create notifications about incoming Kaspersky CyberTrace service events by configuring alert rules.
To create notifications about service events from Kaspersky CyberTrace in Splunk:
sourcetype="kl_cybertrace_events" alert="KL_ALERT_ServiceStopped"
This condition defines the request for searching events that are generated when Feed Service is stopped.
To get more information about all Kaspersky CyberTrace service events, see subsection "Types of alert events" of the "About output format settings" section.
KL_ALERT_ServiceStopped events
Saving alert
The Save As Alert window opens.
You can specify any title.
You can specify any description.
The Save As Alert window
The rule will now appear in Splunk.