icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Classic Splunkbase is heading into retirement…

Splunkbase Classic has been deprecated and will be deactivated on February 18, 2026.
The new version of Splunkbase introduces improved search and discoverability, faster performance, enhanced accessibility, and a modern interface. Start exploring the new experience today!
Splunkbase Classic has been deprecated and will be deactivated on February 18, 2026. Go to new Splunkbase.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Webex Alert Action
SHA256 checksum (webex-alert-action_100.tgz) 5385323092827635edaac43da061871913a27d1da28fa9e5fb178f8e2de3eb5c
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Webex Alert Action

Splunk Cloud
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The Webex Alert app enables Splunk administrators to send automated alert notifications directly to Cisco Webex Teams rooms. This integration allows security operations centers (SOCs) and IT teams to receive real-time alerts from Splunk searches and correlations in their collaborative Webex spaces, ensuring immediate visibility and rapid response to critical events.

Key Features:
- Send Splunk alert results to any Webex Teams room or space
- Support for both individual and group/team spaces
- Customize message formatting with alert details
- Include search results, field values, and metadata in notifications
- Secure authentication using Webex Bot tokens
- Easy configuration through Splunk's alert actions interface
- Compatible with scheduled searches, real-time alerts, and ad-hoc searches

Use Cases:

Security incident notifications for SOC teams
Infrastructure monitoring alerts for DevOps teams
Compliance and audit notifications
Business metrics and KPI alerts
Application performance monitoring
Custom alert workflows for any Splunk use case

This app extends Splunk's native alerting capabilities by leveraging Webex Teams as a modern, collaborative notification channel, enabling teams to discuss and act on alerts in real-time within their existing communication workflows.

Webex Alert for Splunk

Overview

The Webex Alert app provides seamless integration between Splunk and Cisco Webex Teams, enabling automated delivery of Splunk alerts to your team's collaboration spaces. Transform your Splunk alerts into actionable Webex notifications that your team can see, discuss, and respond to immediately.

Features

🚀 Core Capabilities

  • Direct Integration: Send alerts from any Splunk search directly to Webex Teams rooms
  • Flexible Targeting: Support for individual spaces, group rooms, and team spaces
  • Rich Formatting: Customize message content with search results and metadata
  • Secure Authentication: Uses Webex Bot tokens for secure, authenticated messaging
  • Easy Configuration: Simple setup through Splunk's alert actions UI
  • Real-time Delivery: Instant notification delivery to your Webex spaces

🔧 Technical Features

  • Python 3 compatible
  • Works with Splunk Enterprise 8.0+
  • Supports scheduled searches, real-time alerts, and ad-hoc searches
  • Configurable message templates
  • Error handling and logging
  • No external dependencies beyond Webex API

Use Cases

Security Operations

  • Threat Alerts: Notify SOC teams of detected threats, anomalies, or suspicious activities
  • Incident Response: Alert incident response teams for immediate action
  • Compliance Violations: Send notifications when compliance rules are breached

IT Operations

  • System Monitoring: Alert on system failures, performance degradation, or capacity issues
  • Application Performance: Notify DevOps teams of application errors or performance problems
  • Infrastructure Events: Monitor infrastructure health and send critical alerts

Business Operations

  • KPI Alerts: Send business metric alerts to stakeholders
  • SLA Monitoring: Notify teams when SLAs are at risk or breached
  • Custom Workflows: Any Splunk search can trigger a Webex notification

Requirements

Splunk Platform

  • Splunk Enterprise 8.0 or later
  • Splunk Cloud compatible

Webex Requirements

  • Active Cisco Webex Teams account
  • Webex Bot token (created via Webex Developer Portal)
  • Room ID for target Webex space(s)

Network

  • Outbound HTTPS access to Webex API (api.ciscospark.com)

Configuration

1. Create a Webex Bot

  1. Go to Webex Developer Portal
  2. Click Create a New App
  3. Select Create a Bot
  4. Fill in bot details:
  5. Bot name: Splunk Alert Bot (or your preferred name)
  6. Bot username: Choose a unique username
  7. Icon: Optional - upload an icon for your bot
  8. Click Add Bot
  9. Save the Bot Access Token - you'll need this for configuration

2. Get Your Webex Room ID

Method 1: Using Webex Teams
1. Open Webex Teams and go to the room where you want to receive alerts
2. Click the room name, then Settings
3. Copy the Room ID from the URL or settings

Method 2: Using the API

curl -X GET https://webexapis.com/v1/rooms \
  -H "Authorization: Bearer YOUR_BOT_TOKEN"

3. Configure in Splunk

  1. Install the Webex Alert app from Splunkbase
  2. In Splunk Web, go to Settings > Alert Actions
  3. Find Webex Alert and click Setup
  4. Enter your Webex Bot Token
  5. Save the configuration

4. Create an Alert

  1. Run any search in Splunk
  2. Click Save As > Alert
  3. Configure trigger conditions
  4. Under Trigger Actions, select Webex Alert
  5. Enter the Room ID where alerts should be sent
  6. Customize the message format (optional)
  7. Save the alert

Message Formatting

The app supports dynamic field substitution in messages:

Alert: $name$
Time: $trigger_time$
Results: $results.count$ events found

Search: $search$

Available tokens:
- $name$ - Alert name
- $trigger_time$ - When the alert triggered
- $results.count$ - Number of results
- $search$ - Search string
- $results.*$ - Any field from search results

Security Considerations

  • Bot Tokens: Store bot tokens securely using Splunk's credential management
  • Room Access: Ensure the bot has been added to target rooms
  • Network Security: Webex API uses HTTPS (TLS 1.2+)
  • Permissions: Follow principle of least privilege for bot permissions

Troubleshooting

See the Troubleshooting tab for detailed troubleshooting steps.

Support

For issues, feature requests, or questions:
- Splunkbase: Leave a review or comment
- GitHub: [Link to your GitHub repo if applicable]
- Email: [Your support email]

Version History

Version 1.0.0 (Current)

  • Initial release
  • Basic Webex Teams integration
  • Alert action support
  • Python 3 compatible

Release Notes

Version 1.0.0
Jan. 9, 2026

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.