Skip to content

This will provide Splunk ITSI users the ability to send an email alert of underlying Deep Dives (KPIs and Services) of a Notable Event.

Notifications You must be signed in to change notification settings

splunk/itsi-deep-dive-email-alert

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Splunk ITSI Deep Dive Email Alert

This will provide Splunk ITSI users the ability to send an email alert of underlying Deep Dives (KPIs and Services) of a Notable Event.

Tested on Splunk Enterprise v7.1.3 with IT Service Intelligence v3.1.3.

Pre-requisites

  • Required libraries (if not already installed):
  • Access to your Splunk instance via UI as well as via SSH
  • Configure your Splunk instance to send email notification (if not already done)
    • From the home page, select Settings > Server settings > Email settings
    • In Mail Server Settings specify mail host, email security, username and password.
    • In Email Format Settings specify Send email as
    • Save your changes

Installation

  • If not already existing, copy local/*.conf into a local version of $SPLUNK_HOME/etc/apps/SA-ITOA/default/notable_event_actions.conf and $SPLUNK_HOME/etc/apps/SA-ITOA/default/alert_actions.conf

    If files do already exist, just add local/*.conf stanzas into the corresponding ones

  • Copy local/data/ui/alerts/itsi_deepdive_email.html to $SPLUNK_HOME/etc/apps/SA-ITOA/local/data/ui/alerts

    Create the whole path if not existing

  • Add stanzas of README/*.spec into $SPLUNK_HOME/etc/apps/SA-ITOA/README/alert_actions.conf.spec and $SPLUNK_HOME/etc/apps/SA-ITOA/README/savedsearches.conf.spec respectively

  • Copy bin/* to $SPLUNK_HOME/etc/apps/SA-ITOA/bin and make sure their ownership and permissions are as shown below

# Verify
~$ cd $SPLUNK_HOME/etc/apps/SA-ITOA/bin
~$ ls -la | grep email
-rw-r--r--.  1 root root   212 Nov 21 14:11 itsi_deepdive_email_config.py
-rw-r--r--.  1 root root  1938 Nov 21 09:55 itsi_deepdive_email_utils.py
-rw-r--r--.  1 root root  5402 Nov 21 09:55 itsi_deepdive_email.py

# Change permissions
~$ chmod 644 itsi_deepdive_email*.py

# Change ownership
~$ chown root:root itsi_deepdive_email*.py
  • Edit splunk parameters specified at $SPLUNK_HOME/etc/apps/SA-ITOA/bin/itsi_deepdive_email_config.py to configure the alert with your Splunk instance details
splunk = {
    'public_host': 'my.splunkit.io', 
    'port': '8000',
    'mgmt_port': '8089',
    'username': 'admin',
    'password': 'changeme'
}
  • Restart splunk service

Usage

  • Login into your Splunk instance
  • Enter the app IT Service Intelligence among available ones
  • Select Notable Events Review from the navigation bar
  • Click on the event you want to send a custom email from
  • Click on Actions > Custom send email as shown below here
  • Configure the action by filling fields such as
    • To: Email recipient
    • Subject: Email subject
  • Press Done

Specified recipients shall have now received an email listing both Contributing KPIs and Possible Affected Services Deep Dive links in its body. By clicking on them users can directly access data in dedicated Deep Dive dashboards.

References

Acknowledgements

Thanks to Martin Wiser's example for providing a good solid basis for the development of this custom email alert in ITSI.

Contributors

Curious to know who the authors are? Check them out!

EOF

About

This will provide Splunk ITSI users the ability to send an email alert of underlying Deep Dives (KPIs and Services) of a Notable Event.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published