<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Alerts generated through Service now incident.. in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672668#M27793</link>
    <description>&lt;P&gt;You would probably find the splunk Add-on for ServiceNow useful: &lt;A href="https://splunkbase.splunk.com/app/1928" target="_blank"&gt;https://splunkbase.splunk.com/app/1928&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;As for the query, you could compare the list of splunk server names active now versus the servers active a few days ago. e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal host="*splunknamescheme*" OR host IN (splunkserver1, splunkserver2) earliest=-3d latest=-2d 
| dedup host 
| table host
| search NOT [search index=_internal host="*splunknamescheme*" OR host IN (splunkserver1, splunkserver2) earliest=-1d
| dedup host 
| table host]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Then you can add an Alert Action to the alert and make it create an incident: &lt;A href="https://docs.splunk.com/Documentation/AddOns/released/ServiceNow/Usecustomalertactions" target="_blank"&gt;https://docs.splunk.com/Documentation/AddOns/released/ServiceNow/Usecustomalertactions&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 25 Dec 2023 23:12:38 GMT</pubDate>
    <dc:creator>marnall</dc:creator>
    <dc:date>2023-12-25T23:12:38Z</dc:date>
    <item>
      <title>Splunk Alerts generated through Service now incident..</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672657#M27791</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;In my requirement, if any splunk servers are got failed, need to be generated Services now incidents need to be created automatically...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do we write the query and how do we configure Service now incidents, please help me&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Dec 2023 08:28:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672657#M27791</guid>
      <dc:creator>vijreddy30</dc:creator>
      <dc:date>2023-12-25T08:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Alerts generated through Service now incident..</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672668#M27793</link>
      <description>&lt;P&gt;You would probably find the splunk Add-on for ServiceNow useful: &lt;A href="https://splunkbase.splunk.com/app/1928" target="_blank"&gt;https://splunkbase.splunk.com/app/1928&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;As for the query, you could compare the list of splunk server names active now versus the servers active a few days ago. e.g.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal host="*splunknamescheme*" OR host IN (splunkserver1, splunkserver2) earliest=-3d latest=-2d 
| dedup host 
| table host
| search NOT [search index=_internal host="*splunknamescheme*" OR host IN (splunkserver1, splunkserver2) earliest=-1d
| dedup host 
| table host]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Then you can add an Alert Action to the alert and make it create an incident: &lt;A href="https://docs.splunk.com/Documentation/AddOns/released/ServiceNow/Usecustomalertactions" target="_blank"&gt;https://docs.splunk.com/Documentation/AddOns/released/ServiceNow/Usecustomalertactions&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Dec 2023 23:12:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672668#M27793</guid>
      <dc:creator>marnall</dc:creator>
      <dc:date>2023-12-25T23:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Alerts generated through Service now incident..</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672707#M27795</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to below query, it showing the all servers are up, I tested one server stopped and checked&amp;nbsp; it's not showing Down status, please fine the below query&lt;/P&gt;&lt;P&gt;index="_internal"&lt;BR /&gt;| eval host=lower(host)&lt;BR /&gt;| stats count BY host&lt;BR /&gt;| append [ | eval host=lower(host) ]&lt;BR /&gt;| eval status=if(total=0,"Down","up")&lt;BR /&gt;| table host status&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please letme know exact query on that.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2023 08:21:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Splunk-Alerts-generated-through-Service-now-incident/m-p/672707#M27795</guid>
      <dc:creator>vijreddy30</dc:creator>
      <dc:date>2023-12-27T08:21:14Z</dc:date>
    </item>
  </channel>
</rss>

