This will provide Splunk ITSI users the ability to send an email alert of underlying Deep Dives (KPIs and Services) of a Notable Event.
Tested on Splunk Enterprise v7.1.3 with IT Service Intelligence v3.1.3.
- Required libraries (if not already installed):
- Access to your Splunk instance via UI as well as via SSH
- Configure your Splunk instance to send email notification (if not already done)
- From the home page, select Settings > Server settings > Email settings
- In Mail Server Settings specify mail host, email security, username and password.
- In Email Format Settings specify Send email as
- Save your changes
-
If not already existing, copy
local/*.conf
into a local version of$SPLUNK_HOME/etc/apps/SA-ITOA/default/notable_event_actions.conf
and$SPLUNK_HOME/etc/apps/SA-ITOA/default/alert_actions.conf
If files do already exist, just add
local/*.conf
stanzas into the corresponding ones -
Copy
local/data/ui/alerts/itsi_deepdive_email.html
to$SPLUNK_HOME/etc/apps/SA-ITOA/local/data/ui/alerts
Create the whole path if not existing
-
Add stanzas of
README/*.spec
into$SPLUNK_HOME/etc/apps/SA-ITOA/README/alert_actions.conf.spec
and$SPLUNK_HOME/etc/apps/SA-ITOA/README/savedsearches.conf.spec
respectively -
Copy
bin/*
to$SPLUNK_HOME/etc/apps/SA-ITOA/bin
and make sure their ownership and permissions are as shown below
# Verify
~$ cd $SPLUNK_HOME/etc/apps/SA-ITOA/bin
~$ ls -la | grep email
-rw-r--r--. 1 root root 212 Nov 21 14:11 itsi_deepdive_email_config.py
-rw-r--r--. 1 root root 1938 Nov 21 09:55 itsi_deepdive_email_utils.py
-rw-r--r--. 1 root root 5402 Nov 21 09:55 itsi_deepdive_email.py
# Change permissions
~$ chmod 644 itsi_deepdive_email*.py
# Change ownership
~$ chown root:root itsi_deepdive_email*.py
- Edit
splunk
parameters specified at$SPLUNK_HOME/etc/apps/SA-ITOA/bin/itsi_deepdive_email_config.py
to configure the alert with your Splunk instance details
splunk = {
'public_host': 'my.splunkit.io',
'port': '8000',
'mgmt_port': '8089',
'username': 'admin',
'password': 'changeme'
}
- Restart
splunk
service
- Login into your Splunk instance
- Enter the app IT Service Intelligence among available ones
- Select Notable Events Review from the navigation bar
- Click on the event you want to send a custom email from
- Click on Actions > Custom send email as shown below
- Configure the action by filling fields such as
- To: Email recipient
- Subject: Email subject
- Press Done
Specified recipients shall have now received an email listing both Contributing KPIs and Possible Affected Services Deep Dive links in its body. By clicking on them users can directly access data in dedicated Deep Dive dashboards.
- Notable Events
- Send Email
Thanks to Martin Wiser's example for providing a good solid basis for the development of this custom email alert in ITSI.
Curious to know who the authors are? Check them out!
-
❤️ it? Tweet here :
@splunk
or email us atfdse [@] s p l u n k {.} C O M
. -
Want to contribute? Great! Feel free to create a PR.
-
Found a bug? Open an issue
-
Want to develop your own actions in response to Splunk ITSI episodes? Check this out!