Getting Data In

Alert to create NEW ServiceNow Incident

timrich66
Communicator

Hello All,

I have an alert that has an Action to create a SNow Incident when a file has not been received by a certain date.

The first time the alert ran and the action was triggered, a new Incident was created.  Subsequently, the original Incident has been reopened.  This is not what I want.  I need to have a new Incident for each time the action is triggered.

I have tried setting 'state' to 1, which implies New in the documentation here - https://docs.splunk.com/Documentation/AddOns/released/ServiceNow/Commandsandscripts

stateNoNumber4The state of the incident. For example:

1 - New
2 - Active
3 - Awaiting Problem
4 - Awaiting User Info
5 - Awaiting Evidence
6 - Resolved
7 - Closed

I have also left the Correlation ID blank so that a new (unique) ID is created.

Correlation IDA unique ID to support third-party application integration. It should only consist of alphanumeric characters, underscore (_), and hyphen (-) in its value. Leave blank for the Splunk Add-on for ServiceNow to generate a unique ID for you.

 

Thanks in advance for support

0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...