So I have an  spl query, that does these things:    -gets all the values from index=rds_db that is equal to transfer_status to failure  -passes all the field values (those eval fields) to service now to create an incident ticket  -|snowincidentalert creates tickets. (all those fields before the command are rendered as unusable)          -"Incident Number" , "Incident Link", "Correlation ID" are one of those fields that appears after the command  -field mapping the Incident Number field to the number field from index=snow_incident  -using regex to the description to get the fields needed to supply the email lookup and later the email integration (source_sys_name, target_sys_name)  -using source_sys_name to map the email_group field which is on the email_lookup  -creating a case condition that will match the group to the correct email  - table the fields needed so to use this as a parameter for the email integration and send those emails       All of these query is located inside of an alert that will be triggered real-time. In our requirements, we need to be able to create new tickets. In my spl query,  I just indicated the correlation id so I will not be able to create new ticket and flood the service now db with tickets. My problem is if  I dont declare the correlation_id, it doesnt match the incident number that the |snowincidentalert have given.  All I know that was working is up to the |rename "Incident Number" as number. After that, it doesn't show any results.    p.s the email alert integration works fine also. It just doesn't give me an email if I remove the correlation_id  -----------------------------------  index="rds_db"  | eval D1=if(transfer_status="Succesful transfer of file from EKS", "Success", "Failure")  | where D1="Failure"  | rename interface_id as "Service ID", priority as "Priority", source_sys_name as "Source", target_sys_name as "Target", integration_name as IntegrationName  | table "Service ID", "Service Name", "Priority", "Source", "Target", "D1", IntegrationName  | eval state="1"  | eval configuration_item=Source  | eval cmdb_ci=Source  | eval contact_type="Splunk ServiceNow Add-on"  | eval assignment_group=Source  | eval category="Application Software"  | eval subcategory="File_Data_Report"  | eval impact="2"  | eval urgency="2"  | eval priority="2"  | eval short_description="No ".IntegrationName." Received"  | eval custom_fields="u_company=testCompany||comments=Here is my comment||description=".Source.": No ".IntegrationName." Received on [Event Date] by ".Target  | eval account="ServiceNow_account"  | eval correlation_id="bda390dfaf3243328a8994022b45d7a3"  |snowincidentalert  | rename "Incident Number" as number  | join number  [search index=snow_incident]  | rex field=dv_description "(?<source_sys_name>.+): No (?<integration_name>.+) Received on \[Event Date\] by (?<target_sys_name>.+)"  | table dv_description number dv_assignment_group source_sys_name target_sys_name integration_name  | lookup email_lookup email_group as source_sys_name OUTPUT email_group  | eval email_group_address_source=case(email_group=="NCTracks", "testNCTracks@gmail.com",email_group=="PHP-AMHC", "testNCTracks@gmail.com", email_group=="testPHP-BCBS@gmail.com", "testPHP-BCBS@gmail.com",email_group=="Analytics", "testAnalytics@gmail.com",email_group=="Enrollment Broker", "testEnrollmentBroker.@gmail.com")  | lookup email_lookup email_group as target_sys_name OUTPUT email_group  | eval email_group_address_target=case(email_group=="NCTracks", "testNCTracks@gmail.com",email_group=="PHP-AMHC", "testNHP-AMHC@gmail.com", email_group=="testPHP-BCBS@gmail.com", "testPHP-BCBS@gmail.com",email_group=="Analytics", "testAnalytics@gmail.com",email_group=="Enrollment Broker", "testEnrollmentBroker.@gmail.com")  | eval incident_link="https://acnncmeddemo.service-now.com/incident.do?sysparm_query=number=".number  | table number incident_link source_sys_name target_sys_name email_group_address_source email_group_address_target    -----------------------------------     
						
					
					... View more