Dashboards & Visualizations

How to create Incident from splunk

aditsss
Motivator

Hi  Everyone,

I have one requirement .

I am creating Incidents from splunk.

Below is my search query:

index=abc  ns=blazepsfpublish ("NullPointerException" OR "IllegalStateException" OR "RuntimeException" OR "NumberFormatException" OR "NoSuchMethodException" OR "ClassCastException" OR "ParseException" OR "InvocationTargetException" OR "OutOfMemoryError")| rex "message=(?<ExceptionMessage>[^\n]+)"|eval _time = strftime(_time,"%Y-%m-%d %H:%M:%S.%3N")|cluster showcount=t t=0.9|table app_name, ExceptionMessage,cluster_count,_time, environment, pod_name,ns|dedup ExceptionMessage,pod_name|rename app_name as APP_NAME, _time as Time, environment as Environment, pod_name as Pod_Name,cluster_count as Count

while creating Incident through Sahara I am putting this in my $result.table$.

but I ma getting incident like this:

actual_reporter_group: GL
origin_source: splunk
monitor_source: Splunk COE
pipeline_source: Sahara, packet_id: a72f20ac-51b6-42b2-96de-e99b00a0daa4
time_stamp: 2021-03-31T06:30:36.0316552Z
sahara_severity: Minor
enriched_workgroups: GL
incident_key: item.source=Splunk COE;item.ticketingKey=Splunk-SAHARA-Forwarder-Alert-Action :: Incident Testing Alert :: E3 :: splunk ::

 

can someone guide me why I am not getting proper data.

What should I enter in uniqueID to get the proper data.

Thanks in advance

 

 

Labels (3)
0 Karma
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...