ContributorsĬurious to know who the authors are? Check them out! EOF Thanks to Martin Wiser's example for providing a good solid basis for the development of this custom email alert in ITSI. By clicking on them users can directly access data in dedicated Deep Dive dashboards. Specified recipients shall have now received an email listing both Contributing KPIs and Possible Affected Services Deep Dive links in its body. Configure the action by filling fields such as.Click on Actions > Custom send email as shown below.Click on the event you want to send a custom email from.Select Notable Events Review from the navigation bar.Enter the app IT Service Intelligence among available ones.If files do already exist, just add local/*.conf stanzas into the corresponding onesĬopy local/data/ui/alerts/itsi_deepdive_email.html to $SPLUNK_HOME/etc/apps/SA-ITOA/local/data/ui/alertsĪdd stanzas of README/*.spec into $SPLUNK_HOME/etc/apps/SA-ITOA/README/alert_ and $SPLUNK_HOME/etc/apps/SA-ITOA/README/ respectivelyĬopy bin/* to $SPLUNK_HOME/etc/apps/SA-ITOA/bin and make sure their ownership and permissions are as shown below If not already existing, copy local/*.conf into a local version of $SPLUNK_HOME/etc/apps/SA-ITOA/default/notable_event_nf and $SPLUNK_HOME/etc/apps/SA-ITOA/default/alert_nf In Email Format Settings specify Send email as.In Mail Server Settings specify mail host, email security, username and password.From the home page, select Settings > Server settings > Email settings.Configure your Splunk instance to send email notification (if not already done).Access to your Splunk instance via UI as well as via SSH. ![]()
0 Comments
Leave a Reply. |