This is a Splunk Modular Alert for sending messages to a Pubnub channel
You require an activation key to use this App. Visit http://www.baboonbones.com/#activation to obtain a free,non-expiring key
You have to obtain, build and add the pycrypto package yourself :
The simplest way is to build pycrypto and drop the "Crypto" directory in $SPLUNK_HOME/etc/apps/pubnub_alert/bin.
I don't recommend installing the pycrypto package to the Splunk Python runtime's site-packages, this could have unforeseen side effects.
I do not bundle the pycrypto module with the core release , because :
So , here are a few instructions for building and installing pycrypto yourself :
Download the pycrypto package from https://pypi.python.org/pypi/pycrypto
Then run these 3 commands (note : you will need to use a System python 2.7 runtime , not the Splunk python runtime)
python setup.py build python setup.py install python setup.py test
3) browse to where the Crypto module was installed to ie: /usr/local/lib/python2.7/dist-packages/Crypto
4) Copy the "Crypto" directory to $SPLUNK_HOME/etc/apps/pubnub_alert/bin
You will need a Pubnub account to use this Modular Alert.
You can sign up at pubnub.com
Once your account is setup you will then be able to obtain your Publish Key from your profile.
Perform a search in Splunk and then navigate to : Save As -> Alert -> Trigger Actions -> Add Actions -> Publish to Pubnub
On this dialogue you can enter your Pubnub "channel" and "message"
For the message field , token substitution can be used just the same as for email alerts.
Browse to : Settings -> Alert Actions -> Publish to Pubnub -> View Log Events
Or you can search directly in Splunk : index=_internal sourcetype=splunkd component=sendmodalert action="pubnub"
1) Is your "channel" correct ?
2) Are your alerts actually firing ?
3) Is your publish key correct ?
This project was initiated by Damien Dallimore , firstname.lastname@example.org
Added an activation key requirement , visit http://www.baboonbones.com/#activation to obtain a free,non-expiring key
Splunk 7.1 compatible
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.