
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-19-2023 11:59 PM
We have Event Management installed and get events from multiple sources like
- SCOM
- SolarWinds
- Splunk
- etc..
Splunk recently became a clustered environment and the that resulted in that we have multiple sources for Splunk where it includes the hostname.
The old Event Ruels that I had was based on the old hostname, but now since we can recieve events from more then one Splunk host/source, I don't know if there's a good way to handle this. I assume there is, but I don't know of it yet.
The solution I went for as a quick fix was to remove the source in Event Rule, so no matter what host name, the Splunk Rules will trigger - But this will impact Event Rules from other sources.
How can this be solved?
Wildcard does not work
Solved! Go to Solution.
- Labels:
-
Event Management

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
07-03-2023 06:03 AM
It seemed like we used an old version and fixed in 7.3.0 of the "Splunk Add-on for ServiceNow".
After the 7.3.0 version they fixed the source field:
"New features
Version 7.3.0 of the Splunk Add-on for ServiceNow includes the following new features:
- Updated the default value of the Source and Source instance column for the ServiceNow Event Integration.
Before the Source column used Splunk-<hostname_of_splunk_machine> as a value and the Source instance column used Splunk as a value.
Now the Source column uses Splunk-TA as a value and the Source instance column uses Splunk-<hostname_of_splunk_machine> as a value."

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-20-2023 12:56 AM
Wild Card Character works in Event Filter and transform and compose alert .
So you are saying when now events are coming source appears like
HOST1-Splunk
Host2 - Splunk
Host3 - Splunk where all these 3 hosts are part of Cluster.
So are u saying old source name is also hard coded in Event Rule Filter?
I think we can try a before Insert rule on event table to Manipulate Source Data .
Regards
RP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-20-2023 01:53 AM - edited 06-20-2023 01:54 AM
Thanks for input.
Adding an insert rule on event table might be a solution. But I've read that adding business rules on em_event table is not recommended.
But I really appreciate the ideas here.
Please keep the ideas coming.
"Avoid writing business rules for event [em_event] tables, as they do not run in the current default REST URL that is used for event injection."
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-20-2023 02:59 AM - edited 06-20-2023 03:02 AM
May i know what is the Impact of this Splunk Cluster Configuration in ur event rules and Other Components like Alert Correlation, Alert Management rule etc?
I assume Splunk is Consuming service Now event table end point.. its not possible to do any kind of data transformation at Splunk end?
Regards
RP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-20-2023 06:32 AM
Sure thing!
When I define the source I need to specify where it's comming from and if we have 4 hosts that can send events, I don't want to create four copies of all Event Rules for Splunk in order to match if an event comes from Splunk.
However I think I found one way to solve this, and it was to create a condition on "Source instance" in the Event Filter step. This can be done since this is always "Splunk".
But still, I'd really like to know if there is any way to have like a wildcard source in the first Source step.
Kind regards