Join the #BuildWithBuildAgent Challenge! Get recognized, earn exclusive swag, and inspire the ServiceNow Community with what you can build using Build Agent.  Join the Challenge.

Event Rule Binding Sequence

SakshamB
Tera Contributor

I am working on Event Rules for Splunk integration and need clarification on the exact binding sequence when "Override default binding" is enabled CI field matching.

 

My Configuration:

  • Event Rule with "Override default binding" checked
  • Binding Type: "CI Field matching"
  • CI Type: Database Instance

 

What I am observing:

In some events, the system successfully binds Alert to Database Instance CIs using the name field from Additional Information. In others, it falls back to binding to the node (Server CI) even when a Database Instance CI with the matching name exists.

 

My understanding of the sequence:

 

  1. First, attempt to match the node with a CI Name in the DB Instance table.

  2. If no match is found, try matching the node against Computer, OS, or Switch/Router CI types.

  3. If still no match, attempt to match the Additional Info payload with a CI Name in the DB Instance table.

  4. If no match is found, try matching the payload against Computer, OS, or Switch/Router CI types.

  5. If none of the above steps produce a match, no CI is added to the alert.

Specific Question:

Is my understanding of binding sequence correct?

 

What could be the cause for this inconsistency?

 

below are event rule screenshots:

SakshamB_0-1764247211910.pngSakshamB_1-1764247247045.pngSakshamB_2-1764247293841.png

 

0 REPLIES 0