Incident fields Glossary 🔗
Incidents in your Splunk On-Call timeline function like a simple table with two columns: the field name, and the value of that field. Field names can be defined in two ways: - Automatically by Splunk On-Call, - By the integrated monitoring tool, or - Created by a Rules Engine rule.
This makes an exhaustive list of all potential fields nearly impossible. However, certain fields are always present. These fields are defined and explained below, how their values affect the behavior of an incident, and how the Rules engine can be used to manipulate those fields.
Anatomy of an Incident 🔗
When viewing an incident in the timeline, it appears as an abbreviated version, displaying only a few fields that summarize the event: * The incident origin (monitoring tool) * message_type critical*) * entity_display_name (Tune Squad Deployed) * incident number (#10) * state_message (Someone hit the red button) * timestamp.
It is not possible to configure which fields are displayed here, however, you can use the Rules engine to transform these fields.
By selecting the incident number, you can view the alert details. The alert details include all the payload fields.
Important fields 🔗
Message-type and entity_id are two important fields.
message_type
🔗
The message_type
field is the one required field in Splunk On-Call. All other fields would be filled in automatically. message_type
determines the behavior of the alert when it arrives.
Possible values:
CRITICAL: Opens a new incident, which will set off an escalation policy and result in users being paged.
WARNING: May open a new incident depending on configuration in Settings, Alert Configuration, then Create incidents for entities in [xxxxxxx] state. Otherwise, it will post information to the timeline without creating an incident or triggering any escalation policies.
INFO: Displays an entry in the timeline, without opening an incident. An INFO value cannot trigger escalation or paging.
ACKNOWLEDGEMENT: Moves the incident from a triggered to acknowledged state and stops the escalation and paging.
RECOVERY or OK: Resolves the incident and also stops escalation and paging if still active.
注釈
If an alert is received with a different value in the message_type
field than these recognized ones, it will be accepted as an INFO severity alert.
entity_id
🔗
This field serves as the central identity of an incident. It is used to recognize related events and must remainconsistent throughout the life-cycle of the incident. This field is how the Splunk On-Call platform knows that a particular recovery message applies to a particular open incident.
When an incident is unresolved, in a triggered or acknowledged state, and another critical message arrives with the same entity_id
the new message will be rolled up into the existing incident without creating a new incident. This works great for preventing duplicate notifications for the same problem, but users must also be careful not to leave an incident unresolved for too long or they risk missing a separate occurrence of the same problem. If not provided, this field will be auto-filled with a random String value.
User or Monitor Defined Fields 🔗
routing_key
🔗
This field controls the routing of incidents to specific teams. Routing keys can be created and assigned to a team, or
teams, from the Settings, then Routing Keys page.An incident can only have one single routing_key
associated with it.
entity_display_name
🔗
Often times, the entity_id
of an incident can be long and full of jargon. Setting the entity_display_name
will change how the incident appears in the timeline because it is the serves as the title of the incident. This field is also read aloud during phone call notifications, which gives users an opportunity to simplify and customize the message without affecting the life-cycle of the incident.
state_message
🔗
The state_message
field is meant to contain a moreverbose description of the problem. It can also contain URL links. When using an email endpoint integration, the body of the email will become the state_message field.
hostname
If there is a hostname
field with a value in the payload, we will display it after the entity_display_name
in the incident card.
custom_fields
🔗
Users can add as many custom fields with custom names to an incident as they wish. This can be done by manually adding the fields to the HTTP POST request, or by using the Rules engine to create a new field.
Glossary of Fields 🔗
The standard character limit for most payload fields is 1024. Notable exceptions are state_message (20480) and entity_id (512).
Field name |
Possible values |
Purpose` |
Common rules engine use |
ack_author |
Username |
Displays the user who has acknowledged this incident. Remains blank if incident is unacknowledged. |
Not for use with Rules Engine. |
ack_message |
Acknowledgement method |
Displays the method used to acknowledge or is left blank. |
Not for use with Rules Engine |
agent |
Any |
Field for specific legacy integrations. |
Not for use with Rules Engine. |
alert_type |
Any |
Field for specific legacy integrations. |
Not for use with Rules Engine. |
api_key |
Long String value |
Displays the REST Endpoint key your organization uses to reach Splunk On-Call. Each org only has 1. |
Should not be altered with the Rules Engine, but can be used for a rule that matches all integrations using the REST endpoint. |
entity_display_name` |
Any |
|
Can be changed to make the name of the incident more succinct and intuitive without affecting the behavior of the incident. |
entity_id |
Any |
Central identifier for incident. |
Can be altered to combine or separate incidents. |
entity_is_host |
Boolean |
Indicates whether the entity reporting the issue is also the host. |
Not for use with Rules Engine. |
entity_state |
Same as |
Current state of monitored entity (May be different from message_type with certain integrations) |
Not for use with Rules Engine. |
eventType |
Any |
Field for specific legacy integrations. |
Not for use with Rules Engine. |
host_name |
Any |
Displays the affected host. |
Match on this field to control incidents related to a specific host. Change the |
message_type |
CRITICAL |
Opens a new incident |
Change field to this value to always open an incident. This useful with legacy email integrations. |
message_type |
WARNING |
May open a new incident depending on configuration (Settings>>Integrations) |
Behavior controlled by options chosen in Settings, then Integration and Create incidents for entities in [ ] state. |
message_type |
ACKNOWLEDGEMENT |
Moves incident from Triggered to Acknowledged and stops escalation and paging. |
Change field to this value prevent paging, send incident straight to acknowledged state. |
message_type |
INFO |
Posts info to timeline without creating a new incident. |
Change field to this value to quiet a noisy alert tp prevent it from opening a new incident and paging. |
message_type |
RECOVERY or OK |
Resolves incident and stops escalation and paging. |
Change field to this value to resolve an incident. This is useful with legacy email integrations. |
monitor_name |
Any |
Name of specific monitor, if there are multiple, or message sender (email). |
Match on this field to control alerts from a specific monitor. |
monitoring_tool |
Any |
Displays the monitoring tool that triggered the incident. |
Match on this field to control all alerts from a specific monitoring tool. |
NOTIFICATIONTYPE |
String |
Legacy field created for Nagios integrations . |
Not for use with Rules Engine. |
routing_key |
Any (defined by user) |
Used to direct incidents to a specific team. |
Use a transformation to alter the routing key and send the incident to a different team. |
sender |
Any |
Field for specific legacy integrations. |
Not for use with Rules Engine. |
SERVICESTATE |
Any |
Field for specific legacy integrations. |
Not for use with Rules Engine. |
state_message |
Any |
|
|
state_start_time |
Date or Time |
Indicates the date and time that the problem began on the monitored host or service. |
Not for use with Rules Engine. |
subject |
Any |
Field for specific legacy integrations. |
Match on this field to adjust the severity of incidents |
timestamp |
Date or Time |
When monitoring tool detected an anomoly on monitored host or service (sent by monitoring tool, or defaults to |
Not for use with Rules Engine - Actual data is in Unix time format and cannot be used for time-based rules. |
VO_ALERT_RCV_TIME |
Date and time |
When message was received by Splunk On-Call endpoint. |
Not for use with Rules Engine. |
VO_ALERT_TYPE |
String |
Index of alert types for internal use only. |
Not for use with Rules Engine. |
VO_MONITOR_TYPE |
Integer |
Index of monitor types for internal use only. |
Not for use with Rules Engine. |
VO_ORGANIZATION_ID |
org slug |
Slugified version of your organization’s name used internally to identify your account. |
Not for use with Rules Engine. |
VO_UUID |
Random String |
Used internally by Splunk On-Call for logging. |
Not for use with Rules Engine. |