Security alerts often pile up and create noise. This setup turns Splunk alerts into clear Jira incidents, and adds new alerts as comments when a related issue already exists. It helps IT and security teams track events by host and keep a clean record in one place.
An incoming webhook receives a POST from Splunk. A set step cleans the host name so it works in Jira fields. A search step looks in Jira using a custom field for the cleaned host name. A decision step checks if a match was found. If none is found, a new Jira issue is created with the project, issue type, summary, description, and the cleaned host name saved in a custom field. If a match is found, the alert details are added as a comment with the timestamp and description. This design keeps one incident per host and records every new alert in the same ticket.
You will need Jira Software Cloud and Splunk. Point the Splunk webhook to the n8n URL and confirm your Jira custom field name for the host. Expect fewer duplicate tickets, faster handoff, and a clear audit trail of updates. It fits teams that face repeated alerts from the same host, rapid bursts of events, or ongoing investigations that need a single source of truth.