sendalert
Description
Use the sendalert
command to invoke a custom alert action. The command gathers the configuration for the alert action from the alert_actions.conf
file and the saved search and custom parameters passed using the command arguments. Then the command performs token replacement. The command determines the alert action script and arguments to run, creates the alert action payload and executes the script, handing over the payload by using STDIN to the script process.
When running the custom script, the sendalert
command honors the maxtime
setting from the alert_actions.conf
file and terminates the process if the process runs longer than the configured threshold. By default the threshold is set to 5 minutes.
See "Advanced options for working with custom alert actions" in the Developing Views and Apps for Splunk Web manual.
Syntax
sendalert <alert_action_name> [results_link=<url>] [results_path=<path>] [param.<name>=<"value">...]
Required arguments
- alert_action_name
- Syntax: <alert_action_name>
- Description: The name of the alert action configured in the
alert_actions.conf
file
Optional arguments
- results_link
- Syntax: results_link=<url>
- Description: Set the URL link to the search results.
- results_path
- Syntax: results_path=<path>
- Description: Set the location to the file containing the search results.
- param.<name>
- Syntax: param.<name>=<"value">
- Description: The parameter name and value. You can use this name and value pair to specify a variety of things, such as a threshold value, a team name, or the text of a message.
Usage
When you use the sendalert
command in an ad hoc search, the command might be called multiple times if there are a large number of search results. This occurs because preview is enabled, which is the default setting. Turn off preview to avoid the command being called multiple times.
When the sendalert
command is included in a saved search, such as a scheduled report or a scheduled search, the command is called only one time.
Examples
Example 1: Invoke an alert action without any arguments. The alert action script handles checking whether there are necessary parameters that are missing and report the error appropriately.
... | sendalert myaction
Example 2: Trigger the hipchat custom alert action and pass in room and message as custom parameters.
... | sendalert hipchat param.room="SecOps" param.message="There is a security problem!"
Example 3: Trigger the servicenow alert option.
... | sendalert servicenow param.severity="3" param.assigned_to="DevOps" param.short_description="Splunk Alert: this is a potential security issue"
selfjoin | sendemail |
This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10
Feedback submitted, thanks!