Splunk® Supported Add-ons

Splunk Add-on for Microsoft SCOM

Lookups for the Splunk Add-on for Microsoft SCOM

The Splunk Add-on for Microsoft SCOM has the following lookups that map fields from Microsoft SCOM systems to CIM-compliant and Splunk IT Service Intelligence values in the Splunk platform. The lookup files are located in $SPLUNK_HOME/etc/apps/Splunk_TA_microsoft-scom/lookups.

Filename Description
ms_scom_alert_severity.csv The SCOM alert severity lookup maps the severity from SCOM alert to a CIM-compliant string.
ms_scom_countername_to_datamodel_4.3.0.csv Applies to performance data. Lookup uses the value of the "countername" field to map event to the appropriate performance category in CIM.
ms_scom_alert_type.csv The SCOM alert type lookup uses the severity value from SCOM events to map to the "type" CIM field from the Alerts Data Model with a CIM-compliant string.
ms_scom_datamodel.csv Data Model Association for RuleNames
Last modified on 26 August, 2024
PowerShell command/timestamp reference   SQL queries for SCOM direct events processing reference

This documentation applies to the following versions of Splunk® Supported Add-ons: released, released


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters