Alerting

tokens

varsh_6_8_6
Explorer

Hi 
I am trying to set up an alert with the following query for the tickets that is not assigned to someone after 10 mins. I wanted the ticket number to get populated in the mail but I am not getting the same rather the mail is without the ticket number.

index="servicenow"  sourcetype=":incident" |where assigned_to = "" | eval age = now() - _time
|where age>600
|table ticket_number, age, assignment_group, team
| lookup team_details.csv team as team OUTPUTNEW alert_email, enable_alert
| where enable_alert = Y
| sendemail to="$alert_email$" subject="Incident no. "$ticket_number$" is not assigned for more than 10 mins - Please take immediate action" message="
Hi Team,
This is to notify you that the ticket: "$ticket_number$" is not assigned for more than 10 mins. Please take necessary action on priority"

Labels (1)
0 Karma

PickleRick
SplunkTrust
SplunkTrust

You need to use your result tokens, not just some name out of the blue.

https://docs.splunk.com/Documentation/Splunk/latest/Alert/EmailNotificationTokens

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...