Monitoring Splunk

Alerts

SN1
Path Finder

So i have a search which show the indexes that have 0 events last 24hr.  I want to send this result as an alert to microsoft teams from splunk . How can i do that i am using 9.1.4 version.

Labels (1)
0 Karma

PrewinThomas
Motivator

@SN1 

You can create incoming webhooks in teams and configure alert in Splunk and use webhook action under Trigger Actions or run a script to perform the same.

Refer below for creating incoming webhooks in Teams.
#https://learn.microsoft.com/en-us/microsoftteams/platform/webhooks-and-connectors/how-to/add-incomin...


Regards,
Prewin
🌟If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!

SN1
Path Finder

i am pasting the webhook url in the alert action nothing is happening. 


SN1_0-1765465367117.png

 

 

0 Karma

PrewinThomas
Motivator

@SN1 

From your Splunk server, test the webhook URL.

Eg: with curl,

curl -H 'Content-Type: application/json' -d '{"text":"Test message from Splunk"}' https://outlook.office.com/webhook/...


Regards,
Prewin
🌟If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!

SN1
Path Finder

SN1_0-1765545019288.png

 

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...