Splunk ITSI

Action Rule for an email notification in Notable_Event_Aggregation_Policy is not working

tangtangtang12
Observer

ITSI for Alert $result.service_name$ on host $result.src$ $result.description$

An event has been detected:
Host: $result.host$
Source: $result.source$
Error Code: $result.error_code$
Description: $result.description$

I'm fairly new to ITSI and Splunk in general and I couldn't find out any information on tokens that clearly. The only token that is working right now is $result.description$,. Any assistance will be much appreciated. 

 

Thank you

 

Labels (3)
0 Karma

skramp
SplunkTrust
SplunkTrust

Hi,

 

maybe you are searching for this: https://docs.splunk.com/Documentation/Splunk/9.3.1/Alert/EmailNotificationTokens

 

please take also a look into index=_internal if there is a hint why your emails aren’t send. Have you tried if a normal spl query with the command „sendemail“ works? Email server settings are correct? 

0 Karma
Get Updates on the Splunk Community!

Uncovering Multi-Account Fraud with Splunk Banking Analytics

Last month, I met with a Senior Fraud Analyst at a nationally recognized bank to discuss their recent success ...

Secure Your Future: A Deep Dive into the Compliance and Security Enhancements for the ...

What has been announced?  In the blog, “Preparing your Splunk Environment for OpensSSL3,”we announced the ...

New This Month in Splunk Observability Cloud - Synthetic Monitoring updates, UI ...

This month, we’re delivering several platform, infrastructure, application and digital experience monitoring ...