I am trying to pull data from Splunk via a search and send it to Netcool OMNIbus. Right now I am just sending it via an Alert Action to my email to figure this out. In doing so, I cannot seem to find a way to lock on to the actual message in the recorded log event itself. I hope this makes sense. It seems like it is difficult to actually pull and send out the actual result of a search. Passing all the information used for the search seems easy. Am I missing something here? I am really new to Splunk.
For example, if you look at the screen below from my search in Splunk, it finds and returns the log event I was looking for but within the Alert Trigger I send out from Splunk via email, I want to actually send the log event which is...
"[2016-10-14T13:14:57]:WARNING:HEMDP0173W:[WebContainer : 3]:No translation for severity 'P3-Low' could be found. Using the data source conversion instead."
Is this possible?
I do see that you can pass the following arguments...
Arg Environment Variable Value
0 SPLUNKARG0 Script name
1 SPLUNKARG1 Number of events returned
2 SPLUNKARG2 Search terms
3 SPLUNKARG3 Fully qualified query string
4 SPLUNKARG4 Name of report
5 SPLUNKARG5 Trigger reason
For example, "The number of events was greater than 1."
6 SPLUNKARG6 Browser URL to view the report.
7 SPLUNKARG7 Not used for historical reasons.
8 SPLUNKARG8 File in which the results for the search are stored.
But none of these contain the actual value of the search result. The log entry which is what I want to send from Splunk via an Alert. So basically I guess I am looking for a way to actually send returned data of the search result.
You do get the reference to gzip file (results.csv.gz) which contains the raw result. You could decompress the file and see the content.
8 SPLUNK_ARG_8 File in which the results for the search are stored. Contains raw results in gzip file format.
Thanks! True, but it really seems that there should be a much simpler method of doing this. I seems like it could be pulled directly as a field. Is this not possible then?
I just realized that you're looking to include the search result in Email Alert (the argument list that you provided is for Alert script and confused me). See @rich7177's answer for standard way of including results inline OR as attachment. You can also see this link to see what all other attributes (tokens) are available for use in the email alert
Yes, I do get that and have played around with it today. It is true that it does pass the information. It would be nice though if I could actually assigned the entry to a field.
The main problem here is that if your trying to forward these events to say another monitoring product, you need to be able to map the fields. So for example, if I want to forward an Alert to something like Netcool OMNIbus, I need to be able to map it to fields. OMNIbus has tons of ways to receive events including an email probe but even that is an issue when it comes to Splunk. In order for that to even work, I would need total control over the email body and subject line that are sent. When setting up an Alert Action in Splunk, they do not appear to offer this option. I LOVE Splunk so far but not thrilled with the abilities to send data out.
check out tokens which gives the options to include fields from your search result. That said it is usually easier just to get it from SPLUNKARG8 as is being suggested if you are using a script anyway.