- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Howdy,
I'm building out some alerting in Splunk ES, and created a new correlation search.
That is all working, but I'm unable to pass my eval as a value into email alert.
What I have:
| eval alert_message=range.":".sourcetype." log source has not checked in ".'Communicated Minutes Ago'." minutes. On index=".index.". Latest Event:".'Latest Event'
| table alert_message
Just running the search works, the table is there and looks correct.
I've tried variations of $alert_message$ with and without quotes, but the alert_message never gets passed to the email alert.
I haven't tried to generate a notable, but I'm guessing I'll have the same issue.
I feel like I'm missing something easy here...
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Have you tried $results.alert_message$?
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Hi @JJCO
Ensure that you correctly reference your `alert_message` using the correct token syntax. In the email alert settings, you should use `$result.alert_message$`. This assumes that `alert_message` is part of the result set.
Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards
Will
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


Have you tried $results.alert_message$?
If this reply helps you, Karma would be appreciated.
