<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ITSI Notable Event Email Action in Splunk ITSI</title>
    <link>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404323#M878</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;Each of the notable events is generated either by a &lt;STRONG&gt;correlation search, multi-kpi alerts, grouping event&lt;/STRONG&gt; or &lt;STRONG&gt;alert action&lt;/STRONG&gt;. Each one of this carries &lt;STRONG&gt;different $result.fieldnames$&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;For the &lt;STRONG&gt;correlation searches and multi-kpi alerts&lt;/STRONG&gt; you can check the fields available and their names by executing the search that generated the notable event (&lt;STRONG&gt;Go to Configure -&amp;gt; Correlation Searches and copy the Search string defined&lt;/STRONG&gt;). &lt;/P&gt;

&lt;P&gt;Also you can check the fields avilable in both the &lt;STRONG&gt;itsi_tracked_alerts&lt;/STRONG&gt; and &lt;STRONG&gt;itsi_grouped_alerts&lt;/STRONG&gt; indexes. Both of then store the notable events generated by ITSI.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=itsi_grouped_alerts OR index=itsi_tracked_alerts
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Cheers!!!&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:24:12 GMT</pubDate>
    <dc:creator>jaime_ramirez</dc:creator>
    <dc:date>2020-09-30T01:24:12Z</dc:date>
    <item>
      <title>ITSI Notable Event Email Action</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404321#M876</link>
      <description>&lt;P&gt;What are the actual $result.fieldname$ tokens that are available in ITSI Notable Events for the Send to Email action. I'm trying to access the notable event title, description, and whatever other fields I can access from the notable event.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Aug 2018 15:47:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404321#M876</guid>
      <dc:creator>Justinboucher0</dc:creator>
      <dc:date>2018-08-16T15:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: ITSI Notable Event Email Action</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404322#M877</link>
      <description>&lt;P&gt;Take a look at this search  from the _internal index:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;index=_internal sendemail sourcetype=itsi_internal_log&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;And you should see the search that ITSI is running. That will look something like this:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;2019-07-09 11:53:02,134 INFO [itsi.controllers.itoa_rest_interface_provider] [notable_event_actions] [execute_action] [9969] Generated search command= search itsi_event_management_group_index itsi_group_id="5a5eb01b-0a1a-45ac-b4c5-15696d3ac9ad"  | dedup itsi_group_id |  itsi_notable_group_lookup  |  sendemail "email"  subject="$result.itsi_group_description$" message="$result.service_name$ is currently in $result.severity_label$ with a value of $result.severity_value$ at $result.actual_time$&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Execute the generated search command and that will show you the fields that are available.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2019 16:04:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404322#M877</guid>
      <dc:creator>roman3ro</dc:creator>
      <dc:date>2019-07-09T16:04:02Z</dc:date>
    </item>
    <item>
      <title>Re: ITSI Notable Event Email Action</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404323#M878</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;

&lt;P&gt;Each of the notable events is generated either by a &lt;STRONG&gt;correlation search, multi-kpi alerts, grouping event&lt;/STRONG&gt; or &lt;STRONG&gt;alert action&lt;/STRONG&gt;. Each one of this carries &lt;STRONG&gt;different $result.fieldnames$&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;For the &lt;STRONG&gt;correlation searches and multi-kpi alerts&lt;/STRONG&gt; you can check the fields available and their names by executing the search that generated the notable event (&lt;STRONG&gt;Go to Configure -&amp;gt; Correlation Searches and copy the Search string defined&lt;/STRONG&gt;). &lt;/P&gt;

&lt;P&gt;Also you can check the fields avilable in both the &lt;STRONG&gt;itsi_tracked_alerts&lt;/STRONG&gt; and &lt;STRONG&gt;itsi_grouped_alerts&lt;/STRONG&gt; indexes. Both of then store the notable events generated by ITSI.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=itsi_grouped_alerts OR index=itsi_tracked_alerts
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Cheers!!!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:24:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/ITSI-Notable-Event-Email-Action/m-p/404323#M878</guid>
      <dc:creator>jaime_ramirez</dc:creator>
      <dc:date>2020-09-30T01:24:12Z</dc:date>
    </item>
  </channel>
</rss>

