Wildcard on Event Rule source field?

Henrik Jutterst
Tera Guru

We have Event Management installed and get events from multiple sources like

  • SCOM
  • SolarWinds
  • Splunk
  • etc..

Splunk recently became a clustered environment and the that resulted in that we have multiple sources for Splunk where it includes the hostname.

 

The old Event Ruels that I had was based on the old hostname, but now since we can recieve events from more then one Splunk host/source, I don't know if there's a good way to handle this. I assume there is, but I don't know of it yet.

 

The solution I went for as a quick fix was to remove the source in Event Rule, so no matter what host name, the Splunk Rules will trigger - But this will impact Event Rules from other sources.

 

How can this be solved?

 

Wildcard does not work

HenrikJutterst_0-1687244374494.png

 

1 ACCEPTED SOLUTION

Henrik Jutterst
Tera Guru

It seemed like we used an old version and fixed in 7.3.0 of the "Splunk Add-on for ServiceNow".

 

After the 7.3.0 version they fixed the source field:


"New features
Version 7.3.0 of the Splunk Add-on for ServiceNow includes the following new features:

 

 

  • Updated the default value of the Source and Source instance column for the ServiceNow Event Integration.
    Before the Source column used Splunk-<hostname_of_splunk_machine> as a value and the Source instance column used Splunk as a value.
    Now the Source column uses Splunk-TA as a value and the Source instance column uses Splunk-<hostname_of_splunk_machine> as a value."

 

 

Release history for the Splunk Add-on for ServiceNow 

View solution in original post

5 REPLIES 5

Rahul Priyadars
Giga Sage
Giga Sage

Wild Card Character works in Event Filter and transform and compose alert .

So you are saying when now events are coming source appears like

 HOST1-Splunk

Host2 - Splunk 

Host3 - Splunk  where all these 3 hosts are part of Cluster.

 

So are u saying old source name is also hard coded in Event Rule Filter?

 

I think we can try a before Insert rule on event table to Manipulate Source Data .

Regards

RP

Thanks for input.

Adding an insert rule on event table might be a solution. But I've read that adding business rules on em_event table is not recommended.

 

But I really appreciate the ideas here.

Please keep the ideas coming.

 

"Avoid writing business rules for event [em_event] tables, as they do not run in the current default REST URL that is used for event injection."

 

https://docs.servicenow.com/en-US/bundle/utah-it-operations-management/page/product/event-management...

 

HenrikJutterst_0-1687251283777.png

 

May i know what is the Impact of this Splunk Cluster Configuration in ur event rules and Other Components like Alert Correlation, Alert Management rule etc?

 

I assume Splunk is Consuming service Now event table end point.. its not possible to do any kind of data transformation at Splunk end?

 

Regards

RP

Sure thing!

 

When I define the source I need to specify where it's comming from and if we have 4 hosts that can send events, I don't want to create four copies of all Event Rules for Splunk in order to match if an event comes from Splunk.

 

 

HenrikJutterst_0-1687267707934.png

 

 

However I think I found one way to solve this, and it was to create a condition on "Source instance" in the Event Filter step. This can be done since this is always "Splunk".

HenrikJutterst_1-1687267937496.png

 

 

But still, I'd really like to know if there is any way to have like a wildcard source in the first Source step.

 

Kind regards