Splunk ITSI

Action Rule for an email notification in Notable_Event_Aggregation_Policy is not working

tangtangtang12
Observer

ITSI for Alert $result.service_name$ on host $result.src$ $result.description$

An event has been detected:
Host: $result.host$
Source: $result.source$
Error Code: $result.error_code$
Description: $result.description$

I'm fairly new to ITSI and Splunk in general and I couldn't find out any information on tokens that clearly. The only token that is working right now is $result.description$,. Any assistance will be much appreciated. 

 

Thank you

 

Labels (3)
0 Karma

skramp
SplunkTrust
SplunkTrust

Hi,

 

maybe you are searching for this: https://docs.splunk.com/Documentation/Splunk/9.3.1/Alert/EmailNotificationTokens

 

please take also a look into index=_internal if there is a hint why your emails aren’t send. Have you tried if a normal spl query with the command „sendemail“ works? Email server settings are correct? 

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Cloud’s AI Assistant in Action Series: Analyzing and ...

This is the second post in our Splunk Observability Cloud’s AI Assistant in Action series, in which we look at ...

Elevate Your Organization with Splunk’s Next Platform Evolution

 Thursday, July 10, 2025  |  11AM PDT / 2PM EDT Whether you're managing complex deployments or looking to ...

Splunk Answers Content Calendar, June Edition

Get ready for this week’s post dedicated to Splunk Dashboards! We're celebrating the power of community by ...
OSZAR »