This application provides alert actions for Microsoft Teams messages publication to allow formatted messages publication from Splunk, including:
- Actionable message card support
- Defining options globally or on a per alert basis (per alert override)
- Defining comma separated list of fields which will be dynamically used to generated the markdown supported publication
- Choosing icon link for message publication
- Activating potential link action and defining its link (Up to 2 OpenURI actions per alert)
- Activating and configuring an HttpPOST potential action that allows additional interactions between Splunk or a third party application from Microsoft Teams
- Resilient messages publication management, temporary publication failures are automatically stored in a KVstore, and re-tried following a resilient policy
The application provides as well an easy logging access, a basic overview dashboard that exposes successful and failed publications, if any, and finally a builtin alert that can be activated to detect and warn in case of a failure to publish a message in a channel.
See https://ta-ms-teams-alert-action.readthedocs.io for more information.
The Add-on is compatible with Python 2 / Python 3 modes.