sendalert
Description
Use the sendalert
command to invoke a custom alert action. The command gathers the configuration for the alert action from the alert_actions.conf
file and the saved search and custom parameters passed using the command arguments. Then the command performs token replacement. The command determines the alert action script and arguments to run, creates the alert action payload and executes the script, handing over the payload by using STDIN to the script process.
When running the custom script, the sendalert
command honors the maxtime
setting from the alert_actions.conf
file and terminates the process if the process runs longer than the configured threshold. By default the threshold is set to 5 minutes.
See Write the script for a custom alert action for Splunk Cloud Platform or Splunk Enterprise in the Developer Guide on the Developer Portal.
This command is considered risky because, if used incorrectly, it can pose a security risk or potentially lose data when it runs. As a result, this command triggers SPL safeguards. See SPL safeguards for risky commands in Securing the Splunk Platform.
Syntax
sendalert <alert_action_name> [results_link=<url>] [results_path=<path>] [param.<name>=<"value">...]
Required arguments
- alert_action_name
- Syntax: <alert_action_name>
- Description: The name of the alert action configured in the
alert_actions.conf
file
Optional arguments
- results_link
- Syntax: results_link=<url>
- Description: Set the URL link to the search results.
- results_path
- Syntax: results_path=<path>
- Description: Set the location to the file containing the search results.
- param.<name>
- Syntax: param.<name>=<"value">
- Description: The parameter name and value. You can use this name and value pair to specify a variety of things, such as a threshold value, a team name, or the text of a message.
Usage
When you use the sendalert
command in an ad hoc search, the command might be called multiple times if there are a large number of search results. This occurs because previewing the search results on the Statistics tab is enabled by default. If you are using an ad hoc search to test the sendalert
command, testing turn off preview to avoid the command being called multiple times.
When the sendalert
command is included in a saved search, such as a scheduled report or a scheduled search, the command is called only one time.
Capability required
To use this command, you must have a role with the run_sendalert capability. See Define roles on the Splunk platform with capabilities.
Search results format
When the sendalert
command is used in a search or in an alert action, the search results are stored in an archive file in the dispatch directory using the CSV format. The file name is results.csv.gz
. The default format for the search results is SRS, a Splunk-specific binary format for the search results. The CSV format for the archive file is used so that scripts can process the results file. The default SRS format is not designed to be parsed by scripts.
The archived search results format is controlled through the forceCsvResults
setting. This setting is in the [default] stanza in the alert_actions.conf
file.
Examples
Example 1: Invoke an alert action without any arguments. The alert action script handles checking whether there are necessary parameters that are missing and report the error appropriately.
... | sendalert myaction
Example 2: Trigger the hipchat custom alert action and pass in room and message as custom parameters.
... | sendalert hipchat param.room="SecOps" param.message="There is a security problem!"
Example 3: Trigger the servicenow alert option.
... | sendalert servicenow param.severity="3" param.assigned_to="DevOps" param.short_description="Splunk Alert: this is a potential security issue"
selfjoin | sendemail |
This documentation applies to the following versions of Splunk® Enterprise: 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.1.7, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.2.4, 9.3.0, 9.3.1, 9.3.2, 9.4.0
Feedback submitted, thanks!