Splunk ITSI

Action Rule for an email notification in Notable_Event_Aggregation_Policy is not working

tangtangtang12
New Member

ITSI for Alert $result.service_name$ on host $result.src$ $result.description$

An event has been detected:
Host: $result.host$
Source: $result.source$
Error Code: $result.error_code$
Description: $result.description$

I'm fairly new to ITSI and Splunk in general and I couldn't find out any information on tokens that clearly. The only token that is working right now is $result.description$,. Any assistance will be much appreciated. 

 

Thank you

 

Labels (3)
0 Karma

skramp
SplunkTrust
SplunkTrust

Hi,

 

maybe you are searching for this: https://docs.splunk.com/Documentation/Splunk/9.3.1/Alert/EmailNotificationTokens

 

please take also a look into index=_internal if there is a hint why your emails aren’t send. Have you tried if a normal spl query with the command „sendemail“ works? Email server settings are correct? 

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...