What are Alerts?
Alerts are a configurable action in Aiceberg that automatically sends security findings to your connected SIEM when specific signals are detected. This enables real-time threat intelligence and seamless integration with your existing security operations workflows.
When Alerts are Sent
When you have a SIEM integration configured, Aiceberg will automatically send alerts to your SIEM for any signal where "Alert" is configured in the Profile. Learn more about configuring Profile actions in How are Profiles Configured.
Alert Structure
Alerts are sent as "security findings" events and include the following information.
Core Event Data
activity_id: Unique identifier for the activity (set to 1)metadata.product: Source platform (set to "Aiceberg")severity_id: Severity level (currently defaults to 4; future versions may allow per-signal severity customization)state_id: Action state—1 for monitored events, 4 for blocked eventstype_uid: Event type identifier—200101 for monitored events, 200103 for blocked events
Finding Object
title: "AI Interaction Flagged"uid: The prompt or event IDdescription: JSON object containing:signal_type: The type of signal that triggered the alertprofile_id: The Profile identifierprofile_name: The Profile nameapi_key_name: The API key used for the interactionuser_id: The user identifier
src_url: Direct link to the AI interaction details in Aiceberg
Additional Context
Alerts may also include:
Use case ID
Session ID
Actions taken (blocked or modified)
Mode (API or Cannon)
Timestamp of the event
Read more about Integrations here.
Last updated