Splunk Search

Extracting field data from alert to be emailed

reaver3020
New Member

I have an alert configured to automatically send an email upon a user account locking. I'm looking for the email to only include four fields: a specific event code (EventCode=4740), message (Message=A user account was locked out.), Caller Computer Name, and a timestamp of when the event occurred. How do I go about accomplishing this?

Thank you in advance.

0 Karma

maciep
Champion

can you share your current search? I mean, it should just be a matter of tabling those fields...and possibly creating them first if needed.

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...