Skip to content

Allows for a short and detailed message to be specified for each alert. Splunk tokens can be specified as part of the custom messages.

License

Notifications You must be signed in to change notification settings

xmatters/xm-labs-splunk-custom-messages

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

xMatters Splunk integration with Custom Message Properties

Love Splunk and xMatters but tired of just getting a message saying that something is wrong missing the crucial piece of information that you need to make a decision ?

Configured loads of field extracts that look just fantastic in Splunk but frustrated you have to go into Splunk to see the current values for them ??

Want to use Splunk fields values in onward tool chaining ???

Then you need custom message properties on your Splunk integration with xMatters to allow you to specify any message you like in the Splunk Alert config including field values and have them come right through to xMatters events, notifications and integrations !!!!

Turn your alert config from just 2 boring properties ... Original Alert Action Config

... into a mind blowing 4! New Alert Action Config

Turn your boring old messages into something meaningful!

Pre-Requisites

  • xMatters account - If you don't have one, get one!
  • Splunk Enterprise - I've concentrated on Splunk Enterprise. If you know how to get this into Splunk Cloud all the better (and let me know) but I haven't tried it and I suspect that it wouldn't be allowed.

Files

Installation Instructions

1. Setup the standard Splunk to xMatters Integration

This is all about making the existing supported built in integration a little better. So you have to have the existing Splunk for xMatters integration setup first. If you're currently using an older integration, a web hook or your own built integration follow this to install the latest integration in parallel and go from there.

Head to the integration directory in xMatters instance and find the Splunk integration. Follow the instructions to set it up in xMatters and in Splunk. You'll be directed to the online instructions page for the integration along the way.

Integration Directory

(At the time of writing this and testing this integration the Splunk 'App' for xMatters was version 1.3.1)

2. Update the integration in Splunk

Now you have the integration you should be able to go to create a new alert in Splunk with an xMatters action. The configuration screen for the action will give you only 2 configuables - who and what priority. Let's improve on that!

Original Alert Action Config

You're going to need to get access to your Splunk server, and know where Splunk has been installed on it. On my server Splunk was installed in /opt/splunk.

Navigate to where the applications are installed in Splunk. This should be etc/apps within the Splunk install. Here you will see the directory xmatters_alert_action, this is the xMatters application for Splunk. You can either copy xmatters_alert_action from this repo over the top, or just copy these 4 files from the repo over the top of the files on your server with the same names and in the same locations.

xmatters_alert_action/bin/xmatters.py
xmatters_alert_action/README/alert_actions.conf.spec
xmatters_alert_action/default/alert_actions.conf
xmatters_alert_action/default/data/ui/alerts/xmatters.html

At this point it's a good idea to restart Splunk, although it doesn't seem to be essential.

Now check out creating an Alert in Splunk again and add the xMatters action. You should see a couple of extra boxes to define a Short Message and a Detailed Message. Each of these can take the same Splunk tokens you can use in the email action and there's a link to the help page on how to do that as well as some examples already populated. If you have some custom fields for the Splunk event you can put them right in these messages with something like $result.my_favroute_field_name$.

New Alert Action Config

3. Update the integration in xMatters

Ok great, so now you're sending in a couple more properties to xMatters. But xMatters doesn't know what to do with them yet so let's go tell it.

You're going to need to convert the built in integration into a Workflow that you can edit. There's more about this under Convert to Workflow on the Integration Directory help page. Converting an integration to a Workflow cannot be undone. To convert simply find the integration on the configured integrations page and choose Convert to Workflow

Convert Integration Step 1

Convert Integration Step 2

Read and then accept the warning. You'll be delivered into the newly created Workflow.

Go into the layout editor on the Alert form.

Edit Form Layout Step 1

Add two new text properties to the from (I used max length 20000). New properties must be named custom_short_message and custom_detail_message exactly.

Ensure you pull the new properties on to the from and save it. They can go anywhere on the form.

Edit Form Layout Step 2

Great, you now have 2 new properties for your custom messages to go into. Any new events that come on to xMatters from the Splunk alert will have these properties populated with your text and you'll be able to see it on the properties tab of the event. If you want to get these into the notifications that are sent out read on...

4. Update the notifications to have the new messages.

If you're still editing the form layout simply click on to the messages sub tab.

If you've navigated away to test you're new properties then you can find it again on the Workflow page in the Workflow section. Click Edit -> Forms, and then on the Alert form Edit -> Messages

Get to com plan 1

Get to com plan 2

Edit the Email, Test Message and Voice Interaction templates in turn.

Get your art on and put your new message content somewhere it will have the maximum impact!

Edit Messages Step 1

Edit Messages Step 3

Edit Messages Step 5

5. You're done! Now configure your Alerts!!

Great, now you can go create loads of Alerts in Splunk that use the new custom message properties! For each alert you can configure the message properties to have different text and use different field values relevant to that Alert.

In the example from the end of the last section I used a search on a custom field extraction I created in Splunk. The extracted filed is called diskspaceprct so I'm able to put it in the new custom messages on the alert configuration by specifying it as $result.diskspaceprct$

Example 1

Example 2

Tada!


Originally by Adam Watson (xMatters) - Owned by xMatters - See licence file

About

Allows for a short and detailed message to be specified for each alert. Splunk tokens can be specified as part of the custom messages.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 90.0%
  • HTML 10.0%