Alerting

how to forward a msg to email/slack trigger alert

danan
Observer

Hello, 

 

I'm trying to add msg value to slack and email trigger alert but I'm getting the first word of msg field. 

I would like to get the full message. 

here's the search results: 

danan_1-1593947051179.png

here's the slack trigger: I used $results.msg$ 

danan_2-1593947120233.png

this is what I get: 

danan_3-1593947200521.png

 

now, I want to get the full message. 

instead of "Test", I want to forward the full message from msg field: "Test message generated successfully" 

could you please assist? 

Thanks,

 

 
Labels (1)
Tags (2)
0 Karma

renjith_nair
Legend

@danan,

It doesn't seem to take the msg field but the literal "msg" from your token.

Use $result.msg$ instead of $results.msg$

Please be reminded that the filed values are limited to first value for the specified field name from the first search result row. Also make sure that the field is available(fields a,b,c,) in the result set especially if its an extracted field

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

danan
Observer

@renjith_nair ,  I've changed to $result.msg$ but still, it presents only the first word.

maybe there are other ways to get the full message instead of the first word? 

 

Thanks, 

Dan

 

 

 

0 Karma

renjith_nair
Legend

@danan, in your screen shot (between host and sourcetype), it extracts "Test" as a value in msg. You shall try adding quotes around the message to treat them as a single field , e.g. "Test message generated ....".

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma

danan
Observer

@renjith_nair , Thanks! how do i do this? 

0 Karma

renjith_nair
Legend

It's easy if you could change in the data inputs/ingest time. Just add quotes around the value before its pushed to Splunk.

For those events which are already available in Splunk, you may extract it from _raw

e.g.

|rex "msg=(?<message>.+)"

 

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...