Alerting

How to customize email alerts for recipients?

damucka
Builder

Hello,

I have the following alert search:

index=mlbso_changelog  (crash_context OR crash_stack OR crash_shortinfo) AND source="*crash*" NOT "Table of contents" | rex field=source "(?<filename>[\w\d\.-]+$)"

The idea is to notify the system responsibles on the crashes happening in the corresponding systems. The search itself goes over the crashdump files of many systems, the only differentiation would be then over the field filename.
Now, I would like to keep it simple and have only one alert for all the systems, but depending on the content of the filename trigger the alert e-mail to the specific recipient group, like for the filename 'A' to the defined e-mail group "Owner A", etc. These are not the same people.

How would I do it?

Kind Regards,
Kamil

0 Karma
1 Solution

DMohn
Motivator

You could include a lookup in your search, which maps the recipient email address according to the filename:

index=mlbso_changelog  (crash_context OR crash_stack OR crash_shortinfo) AND source="*crash*" NOT "Table of contents" | rex field=source "(?<filename>[\w\d\.-]+$)" | lookup email_mapping filename OUTPUT recipient_mail

Then use the variable in your alert by setting the recipient field as $result.recipient_mail$

See https://docs.splunk.com/Documentation/Splunk/latest/Alert/EmailNotificationTokens for further details

View solution in original post

0 Karma

DMohn
Motivator

You could include a lookup in your search, which maps the recipient email address according to the filename:

index=mlbso_changelog  (crash_context OR crash_stack OR crash_shortinfo) AND source="*crash*" NOT "Table of contents" | rex field=source "(?<filename>[\w\d\.-]+$)" | lookup email_mapping filename OUTPUT recipient_mail

Then use the variable in your alert by setting the recipient field as $result.recipient_mail$

See https://docs.splunk.com/Documentation/Splunk/latest/Alert/EmailNotificationTokens for further details

0 Karma

damucka
Builder

Hi @DMohn

Thank you, I implemented your idea and it works perfect.

Kind Regards,
Kamil

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...