Skip to main content

Playbook Payloads

When a playbook is run, a payload is passed from the initial object to the playbook (for example, from an alert, entity, or Insight). The variables in the payload can be assigned to parameters and used as inputs for different actions in the playbook.

You select the initial object to use for the payload when you create a playbook. In the Add one or more params as a playbook input field, you select the kind of trigger that will execute the playbook:
Types of start node parameters

note

If you are using nested playbook nodes, then you will need to configure the parameters of the Start Node in the child playbook to include the outputs of the parent playbook that are passed to the child playbook. It is not recommended to use parameter arrays (for example, signals[].id) as the Start Node parameters for the child playbook; you should use a standard parameter names instead (for example, signals.id).

Following are examples of payloads from different trigger types:

Alert payload

View an alert payload

  1. Access the alert list.
  2. Open an alert that uses a playbook.
  3. On the alert details page, click the Playbooks button to see automated playbooks attached to the alert.
    Playbook on an alert
  4. Click the playbook name. The playbook opens in the Automation Service.
  5. To view the playbook's payload, click > to the right of the playbook name.
    Open playbook payload
    The alert payload appears.
    Alert payload

Alert payload variables

The following variables are passed in the payload from an alert to a playbook.

VariableDescription
​​IdThe unique identifier for alert that triggered the playbook.
NameThe name of the monitor.
QueryThe query used in the monitor.
QueryURLThe URL to the logs or metrics query within Sumo Logic.
AlertNameThe name of the alert.
SourceURLThe URL to the configuration or status page of the monitor in Sumo Logic.
AlertGroupThe alert grouping that triggered the alert, including associated values for that field.
DescriptionThe description of the monitor.
MonitorTypeThe type of alert, either Logs or Metrics.
ResultsJsonJSON object containing the query results that triggered the alert.
TriggerTimeThe date and time the query triggered the alert.
TriggerTypeThe status of the alert or recovery. Alert will have a status of Normal, Critical, Warning, or Missing Data. Recovery will have a status of ResolvedCritical, ResolvedWarning, or ResolvedMissingData.
TriggerValueThe value that triggered the alert.
NotificationsThe details for the notifications configured in the monitor.
NumRawResultsNumber of results returned by the search.
DetectionMethodThe type of detection method used to detect alerts. Values are based on static or outlier triggers and data type, either logs or metrics. The value will be LogsStaticCondition, MetricsStaticCondition, LogsOutlierCondition, MetricsOutlierCondition, LogsMissingDataCondition, or MetricsMissingDataCondition.
NumQueryResultsThe number of results the query returned.
SloDashboardURLThe URL to the SLO dashboard.
TriggerQueryURLThe URL to the log search for the query that triggered the alert.
AlertResponseURLThe URL to the alert page for the corresponding alert ID.
TriggerConditionThe condition that triggered the alert.
TriggerTimeRangeThe time range of the query that triggered the alert.
ResultsJsonParsedThe parsed fields from ResultsJson.
AggregateResultsJsonJSON object containing the query results that triggered the alert, along with aggregate values such as message count.
customPlaceholderMapThe parsed fields from ResultsJson and the aggregate values returned from the query. The fields specific to the query that triggered the alert can be referenced by using customPlaceholderMap. For example, if the result of the query includes a field named user_name, this can be referenced by calling customPlaceholderMap[].user_name.
AggregateResultsJsonParsedThe parsed fields from AggregateResultsJson.

Alert payload example

{
"Id": "00000000016CCCDD",
"Name": "Amazon Guard Duty Brute Force",
"Query": "_sourceCategory=Labs/AWS/GuardDuty_V3 | parse \"{\\\"key\\\":\\\"Owner\\\",\\\"value\\\":\\\"*\\\"}\" as owner_key | json field=_raw \"service.action.networkConnectionAction.remotePortDetails.portName\"as port_name | json field=_raw \"service.action.networkConnectionAction.remotePortDetails.port\" as port | json field=_raw \"service.action.networkConnectionAction.remoteIpDetails.ipAddressV4\" as ip_address | json field=_raw \"accountId\", \"region\", \"partition\", \"id\", \"arn\", \"type\",\"service.serviceName\",\"service.detectorId\",\"service.action\",\"severity\",\"title\",\"description\", \"vpcId\", \"subnetId\", \"groupId\" , \"tags\", \"groupName\", \"resource.instanceDetails.instanceId\" as account_id, region, partition, id, arn, type, service_name, detector_id, action, severity, title, description, vpcId, subnetId , securityGroupId, tags, securityGroupName, instanceid nodrop | where type matches \"*BruteForce*\" | count by instanceid, ip_address, port, port_name, owner_key",
"QueryURL": "https://live.us2.sumologic.com/ui/index.html#/search/1IzrB2mrW6L7egF1GY3zwnqJW663xPamyh9oe1AcFBanRckiRpXQiuPU2hOngFWnHO9bOLhpZ1GnssHTKtQpcLPBAOBp8wwW9VerT83Fj77k6hXQqMl5lI3tqsPv5bMG",
"AlertName": "Amazon GuardDuty Brute Force Finding",
"SourceURL": "https://live.us2.sumologic.com/ui/#/alerts/unified-monitors/00000000000007A0?selectedRows=0000000000593B6D",
"AlertGroup": "instanceid=i-F56tg45tty5gfgd45",
"Description": "",
"MonitorType": "Logs",
"ResultsJson": "[{\"Count\":1,\"instanceid\":\"i-F56tg45tty5gfgd45\",\"ip_address\":\"78.24.180.93\",\"owner_key\":\"security@lxechip.com\",\"port\":\"22\",\"port_name\":\"SSH\"}]",
"TriggerTime": "05/01/2024 02:08:46 PM CDT",
"TriggerType": "Critical",
"TriggerValue": 1,
"Notifications": [
{
"notification": {
"images": [],
"subject": "Monitor Alert: {{TriggerType}} on {{AlertName}}",
"actionId": -4194941809035894000,
"jsonClass": "EmailAction",
"ccRecipients": [],
"templateName": "Default Unified Monitor Email With Alert Response Variables",
"toRecipients": [
"example@sumologic.com"
],
"bccRecipients": [],
"relatedContent": [],
"emailBodyMessage": ""
},
"runForTriggerTypes": [
"Critical"
]
}
],
"NumRawResults": "45",
"DetectionMethod": "LogsStaticCondition",
"NumQueryResults": "1",
"SloDashboardURL": "",
"TriggerQueryURL": "https://live.us2.sumologic.com/ui/index.html#/search/1IzrB2mrW6L7egF1GY3zwnqJW663xPamyh9oe1AcFBanRckiRpXQiuPU2hOngFWnHO9bOLhpZ1GnssHTKtQpcLPBAOBp8wwW9VerT83Fj77k6hXQqMl5lI3tqsPv5bMG",
"AlertResponseURL": "https://live.us2.sumologic.com/ui/#/alert/00000000016CCCDD",
"TriggerCondition": "ResultCount is Greater than 0.0 in the last 1440 minutes",
"TriggerTimeRange": "04/30/2024 02:06:46 PM CDT to 05/01/2024 02:06:46 PM CDT",
"ResultsJsonParsed": [
{
"port": "22",
"Count": 1,
"owner_key": "security@example.com",
"port_name": "SSH",
"instanceid": "i-F56tg45tty5gfgd45",
"ip_address": "78.24.180.93"
}
],
"AggregateResultsJson": "[{\"Count\":1,\"instanceid\":\"i-F56tg45tty5gfgd45\",\"ip_address\":\"78.24.180.93\",\"owner_key\":\"security@lxechip.com\",\"port\":\"22\",\"port_name\":\"SSH\"}]",
"customPlaceholderMap": [
{
"port": "22",
"Count": "1",
"_count": "1",
"owner_key": "security@example.com",
"port_name": "SSH",
"instanceid": "i-F56tg45tty5gfgd45",
"ip_address": "78.24.180.93"
}
],
"AggregateResultsJsonParsed": [
{
"port": "22",
"Count": 1,
"owner_key": "security@example.com",
"port_name": "SSH",
"instanceid": "i-F56tg45tty5gfgd45",
"ip_address": "78.24.180.93"
}
]
}

Entity payload

View an entity payload

  1. Open an entity that uses playbooks (that is, that has automations).
  2. Click the Automations button at the top of the entity details page to view the automations on the entity.
    Automation on an Entity in Cloud SIEM
  3. Click View Playbook on an automation. The automation's playbook opens in the Automation Service.
  4. To view the playbook's payload, click > to the right of the playbook name.
    Open playbook payload
    The entity payload appears.
    Entity payload

Entity payload variables

VariableDescription
​​IdThe unique ID of the entity whose information is provided in the payload.
nameThe entity’s name. ​
tagsTags attached to the entity.​
valueThe value of the entity.
hostnameThe hostname of the entity (if the entity is an item that can have a hostname, such as a computer). ​
lastSeenWhen the entity was last seen in a record. ​
firstSeenWhen the entity was first seen in a record. ​
inventoryThe inventory source for the entity (if it originated in an inventory). ​
entityTypeThe type of entity. ​
macAddressThe medium access control (MAC) address assigned to the entity (if the entity is a piece of hardware). ​
reputationThe reputation score for the entity. ​
sensorZoneSensor zone for the entity. ​
criticalityThe criticality of the entity.
isSuppressedWhether the entity is suppressed.
activityScoreThe entity’s activity score.
recentSignalSeverityThe most recent severity of the signal that the entity appeared on.

Entity payload example

{
"id": "_ip-198.51.100.0",
"name": "198.51.100.0",
"tags": [],
"value": "198.51.100.0",
"hostname": null,
"lastSeen": "2024-08-30T13:36:18",
"firstSeen": null,
"inventory": [],
"entityType": "_ip",
"macAddress": null,
"reputation": null,
"sensorZone": null,
"criticality": null,
"isSuppressed": false,
"activityScore": 12,
"recentSignalSeverity": 12
}

Insight payload

View an Insight payload

  1. Open an Insight that uses playbooks (that is, that has automations).
  2. Click the Automations button at the top of the Insight details page to view the automations on the Insight.
    Automations on an Insight
  3. Click View Playbook on an automation. The automation's playbook opens in the Automation Service.
  4. To view the playbook's payload, click > to the right of the playbook name.
    Insight playbook
    The Insight payload appears.
    Insight payload

Insight payload variables

VariableDescription
​​idThe unique ID of the Insight whose information is provided in the payload.
nameThe name of the Insight.
tagsTags attached to the Insight.
orgIdThe ID of the Sumo Logic organization where the Insight originated.
closedWhether the Insight is closed.
entityThe entity the Insight fired on.
sourceThe source of the Insight data.
statusThe current status of the Insight.
createdWhen the Insight was created.
signalsThe Signals in the Insight.
assigneeThe analyst assigned to the incident.
closedByThe analyst who closed the Insight (if it’s status is closed).
severityThe severity of the Insight.
timestampThe timestamp when the Insight fired.
assignedToThe analyst assigned to the incident.
confidenceIf sufficient data is available, a Global Confidence score for the Insight is shown.
readableIdThe human-readable ID of the Insight.
resolutionThe resolution of the Insight (if the Insight is resolved).
descriptionA description of the Insight.
lastUpdatedWhen the Insight was last updated.
lastUpdatedByThe analyst who last updated the Insight.
subResolutionThe sub-resolution of the Insight (if the Insight is resolved and if a sub-resolution is applied).
teamAssignedtoThe team the Insight is assigned to.
timeToResponseThe time it took to respond to the Insight.
timeToDetectionThe time it took to detect the Insight.
involvedEntitiesThe entities involved in the Insight.
timeToRemediationThe time it took to resolve the Insight.

Insight payload example

{
"id": "8e965194-f2da-36e0-839d-c2bacffca684",
"name": "Unspecified Malicious Activity",
"tags": [
"custom-tag",
"dataComponent:File",
"foo",
"MITRE_Expansion_C2",
"testtag"
],
"orgId": "0000000006ACDE44",
"closed": null,
"entity": {
"id": "_ip-192.0.2.0",
"name": "192.0.2.0",
"value": "192.0.2.0",
"hostname": null,
"entityType": "_ip",
"macAddress": null,
"sensorZone": ""
},
"source": "ALGORITHM",
"status": {
"name": "new",
"displayName": "New"
},
"created": "2024-09-05T20:25:59.673356",
"signals": [
{
"id": "d02c5f27-5925-54a0-b0dd-0fee9ee2de2d",
"name": "CrowdStrike Aggregation Rule test signal",
"tags": [],
"stage": "Unknown/Other",
"entity": {
"id": "_ip-192.0.2.0",
"name": "192.0.2.0",
"value": "192.0.2.0",
"hostname": null,
"entityType": "_ip",
"macAddress": null,
"sensorZone": ""
},
"ruleId": "AGGREGATION-U07128",
"created": "2024-09-05T20:20:51.904000",
"severity": 4,
"artifacts": [],
"timestamp": "2024-09-05T20:20:51.904000",
"contentType": "RULE",
"description": "test description",
"recordCount": 1,
"recordTypes": [],
"recordSearchDetails": {
"query": "_index=sec_record_* | where (if (isNull(metadata_vendor), true, metadata_vendor != \"CrowdStrike\") and if (isNull(objectType), true, objectType != \"email\") and if (isNull(srcDevice_ip), false, srcDevice_ip == \"192.0.2.0\"))",
"queryEndTime": "2024-09-05T20:24:00",
"queryStartTime": "2024-09-05T19:24:00"
}
},
{
"id": "34b173fe-792b-55b0-8723-808ded9547ce",
"name": "Exclude CrowdStrike and Email Chain Rule",
"tags": [
"custom-tag",
"foo",
"testtag"
],
"stage": "Unknown/Other",
"entity": {
"id": "_ip-192.0.2.0",
"name": "192.0.2.0",
"value": "192.0.2.0",
"hostname": null,
"entityType": "_ip",
"macAddress": null,
"sensorZone": ""
},
"ruleId": "CHAIN-U07162",
"created": "2024-09-05T20:20:51.904000",
"severity": 4,
"artifacts": [],
"timestamp": "2024-09-05T20:20:51.904000",
"contentType": "RULE",
"description": "chain rule test description",
"recordCount": 1,
"recordTypes": [],
"recordSearchDetails": {
"query": "_index=sec_record_* | where ((if (isNull(metadata_vendor), true, metadata_vendor != \"CrowdStrike\") or if (isNull(objectType), true, objectType != \"email\")) and if (isNull(srcDevice_ip), false, srcDevice_ip == \"192.0.2.0\"))",
"queryEndTime": "2024-09-05T20:24:00",
"queryStartTime": "2024-09-05T19:24:00"
}
},
{
"id": "f7ee1ba7-fb69-51e3-8cbe-a7673e237dfe",
"name": "CrowdStrike First Seen Rule test signal",
"tags": [
"testtag",
"foo",
"custom-tag"
],
"stage": "Unknown/Other",
"entity": {
"id": "_ip-192.0.2.0",
"name": "192.0.2.0",
"value": "192.0.2.0",
"hostname": null,
"entityType": "_ip",
"macAddress": null,
"sensorZone": ""
},
"ruleId": "FIRST-U00161",
"created": "2024-09-05T20:20:51.904000",
"severity": 4,
"artifacts": [],
"timestamp": "2024-09-05T20:20:51.904000",
"contentType": "ANOMALY",
"description": "test description",
"recordCount": 1,
"recordTypes": [],
"recordSearchDetails": null
},
{
"id": "5f0db81c-c11a-5b13-b2e0-8a25de6ba376",
"name": "Exclude CrowdStrike and Email Threshold Rule test",
"tags": [
"MITRE_Expansion_C2",
"testtag",
"dataComponent:File"
],
"stage": "Unknown/Other",
"entity": {
"id": "_ip-192.0.2.0",
"name": "192.0.2.0",
"value": "192.0.2.0",
"hostname": null,
"entityType": "_ip",
"macAddress": null,
"sensorZone": ""
},
"ruleId": "THRESHOLD-U07169",
"created": "2024-09-05T20:25:51.043000",
"severity": 4,
"artifacts": [],
"timestamp": "2024-09-05T20:25:51.043000",
"contentType": "RULE",
"description": "Test Threshold rule",
"recordCount": 1,
"recordTypes": [],
"recordSearchDetails": {
"query": "_index=sec_record_* | where (if (isNull(metadata_vendor), true, metadata_vendor != \"CrowdStrike\") and if (isNull(objectType), true, objectType != \"email\") and if (isNull(srcDevice_ip), false, srcDevice_ip == \"192.0.2.0\"))",
"queryEndTime": "2024-09-05T21:36:00",
"queryStartTime": "2024-09-05T09:36:00"
}
}
],
"assignee": null,
"closedBy": null,
"severity": "HIGH",
"timestamp": "2024-09-05T20:25:51.043000",
"assignedTo": null,
"confidence": null,
"readableId": "INSIGHT-637",
"resolution": null,
"description": "Unknown/Other",
"lastUpdated": "2024-09-05T20:25:59.673351",
"lastUpdatedBy": null,
"subResolution": null,
"teamAssignedTo": null,
"timeToResponse": null,
"timeToDetection": 307.769356,
"involvedEntities": [
{
"id": "_ip-192.0.2.0",
"name": "192.0.2.0",
"value": "192.0.2.0",
"hostname": null,
"entityType": "_ip",
"macAddress": null,
"sensorZone": null
},
{
"id": "_username-pete@tclab.us",
"name": "pete@tclab.us",
"value": "pete@tclab.us",
"hostname": null,
"entityType": "_username",
"macAddress": null,
"sensorZone": null
},
{
"id": "_username-key--d2b90316--a1d3--492d--beb5--308184ab4973 (Sumo Logic API client (read only))",
"name": "key-d2b90316-a1d3-492d-beb5-308184ab4973 (Sumo Logic API client (read only))",
"value": "key-d2b90316-a1d3-492d-beb5-308184ab4973 (Sumo Logic API client (read only))",
"hostname": null,
"entityType": "_username",
"macAddress": null,
"sensorZone": null
}
],
"timeToRemediation": null
}
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.