We categorize log events using event types and assign them to people to address the issues using tags.
Our events are generally exception stacktraces (Java).
Our event types are basically a search by two fields (source and message).
What we do now is we look for events which don't match to any existing event type and create a new event type for them.
What we would like to do is to automate the event type creation process.
We have a volume of event types we have already created as a learning material.
Is there any type of AI integration for this purpose in Splunk?