Splunk® Common Information Model Add-on

Common Information Model Add-on Manual

This documentation does not apply to the most recent version of Splunk® Common Information Model Add-on. For documentation on the most recent version, go to the latest release.

Alerts

The fields and tags in the Alerts data model describe the alerts produced by alerting systems, such as Nagios or NetCool, for use in Splunk correlation searches or dashboards. They are not to be used to describe Splunk Alerts or Notable Events, which are already modeled in other contexts.

Tags used with the Alert Messages event category

Object name(s) Tag name Required?
Alerts alert YES

Fields for the Alert Messages event category

Object name(s) Field name Data type Description Expected values
Alerts app string The application involved in the event, such as win:app:trendmicro, vmware, nagios.
Alerts dest string The destination where the alert message was sent to, such as an email address or SNMP trap. May be aliased from more specific fields, such as dest_host, dest_ip, or dest_name.
Alerts body string The body of a message.
Alerts id string The unique identifier of a message.
Alerts severity string The severity of a message.

Note: This field is a string. Please use a severity_id field for severity ID fields that are integer data types. Specific values are required. Please use vendor_severity for the vendor's own human-readable strings (such as Good, Bad, Really Bad, and so on).
critical, high, medium, low, informational, unknown
Alerts severity_id string A numeric severity indicator for a message.
Alerts src string The source of the message. May be aliased from more specific fields, such as src_host, src_ip, or src_name. Also see the optional src_* fields listed in Optional Subject Fields.
Alerts subject string The message subject. free-form
Alerts type string The message type. alarm, alert, event, task, unknown
Last modified on 08 September, 2016
How to get support and find out more about Splunk   Application State

This documentation applies to the following versions of Splunk® Common Information Model Add-on: 3.0, 3.0.1, 3.0.2


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters