

See About the commands, alert actions, and scripts available with the Splunk Add-on for ServiceNow for an explanation of the fields.
#Splunk transaction same event install
This mapping is active once you install the Splunk integration plugin onto the ServiceNow instance.Ĭreate an incident or event from a custom alert action The #Transform map in ServiceNow is the mapping between the Splunk Integration Plugin and the ServiceNow Incident table. This is a default table provided by ServiceNow. The #ServiceNow Incident table is where you can see all created or updated incidents. If the correlation ID doesn't exist, the plugin would create a new incident.
#Splunk transaction same event update
If the correlation ID exists on the Incident table, the plugin would update the incident. You can use this plugin to manage, insert or update an incident on the Incident table. The #Splunk Import set is the Splunk Integration plugin found in the ServiceNow store that you can install onto your ServiceNow instance. The number of events returned by the search equals the number of incidents or events created in ServiceNow. This can occur if the search string that you save as an alert returns multiple events. Custom alert actions are a user-friendly implementation of the alert-triggered scripts available in previous versions.īefore you can use the custom alert actions, see configure ServiceNow to integrate with the Splunk platform.ĭepending on the search that you save as an alert, the custom alert action might create multiple events or incidents in ServiceNow. Custom alert actions are available in Splunk platform version 6.3.0 and later. Use the Splunk Add-on for ServiceNow to create custom alert actions that automatically create incidents and events or update existing incidents. Use custom alert actions for the Splunk Add-on for ServiceNow
