icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Microsoft Teams messages publication addon
SHA256 checksum (microsoft-teams-messages-publication-addon_1016.tgz) 01cde654416c284dae8f52f6ae213fb4d8e9efe80d5f33e942fc4bbc05de81dd SHA256 checksum (microsoft-teams-messages-publication-addon_1015.tgz) 977f536f3d8944dc64e9ab68a624111e72b93f2ba1976b810151a487a4d620b1 SHA256 checksum (microsoft-teams-messages-publication-addon_1014.tgz) 5f866c2fcc3da726e410e45cf78e41fcf49d9b8bfbbce80feea6a96cb525c453 SHA256 checksum (microsoft-teams-messages-publication-addon_1012.tgz) 437935c2acc069427a77ee9ba08efd9943b092d61955f74b227d8875a7ab1430 SHA256 checksum (microsoft-teams-messages-publication-addon_1011.tgz) 7d17ed93952ceb6cbd32a8ef0cb7f9fe65e03590ab68127587763c640fcd254e SHA256 checksum (microsoft-teams-messages-publication-addon_1010.tgz) 064dd4ea1cc1b3f0496ca46bd4392822fe2526eca1096f60aba56764d3b9b420 SHA256 checksum (microsoft-teams-messages-publication-addon_109.tgz) 0642f955b928293365ee562f61d29b6e89ad9e1e94616c07664334b4f90849bb SHA256 checksum (microsoft-teams-messages-publication-addon_107.tgz) 62e20adc775a0e558c4f8b5d27e71eb16656a03dd7d0b0c6fe388edb3152c487 SHA256 checksum (microsoft-teams-messages-publication-addon_106.tgz) 1ac1363048cebc5f7a99464b7b145da3463c48a14e5c94eb600a2e75fba0e55b SHA256 checksum (microsoft-teams-messages-publication-addon_105.tgz) 5f2870c625abf54ddb40f609a8120a73e254243dec6112d14a25b25c86deb2ce SHA256 checksum (microsoft-teams-messages-publication-addon_104.tgz) f61e43297cfa96e02ec1033de5fa0e3fecdb6d73c8d2bd2c900eb64ecc37cdc3 SHA256 checksum (microsoft-teams-messages-publication-addon_103.tgz) 43cfc9ebaeab70e692d922285a8d561864d8fcec022566620f38911ad0f850c1 SHA256 checksum (microsoft-teams-messages-publication-addon_102.tgz) ea115b7350fa359e5d985f3f6ffb57f8084a3517d030ff18e860339bef24f8bb SHA256 checksum (microsoft-teams-messages-publication-addon_101.tgz) 3ed2baa65f31b239055a9ac48eb0fd9e1fad8eccc13eb22b40381beae4584888 SHA256 checksum (microsoft-teams-messages-publication-addon_100.tgz) a79896ee81ce74adfbe06d1891602cac12caa54c76f74b6d5b3601e050daccfc
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Microsoft Teams messages publication addon

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Overview
Details
This application provides alert actions for Microsoft Teams messages publication to allow formatted messages publication from Splunk, including:

- Actionable message card support
- Defining options globally or on a per alert basis (per alert override)
- Defining comma separated list of fields which will be dynamically used to generated the markdown supported publication
- Choosing icon link for message publication
- Activating potential link action and defining its link (Up to 2 OpenURI actions per alert)
- Activating and configuring an HttpPOST potential action that allows additional interactions between Splunk or a third party application from Microsoft Teams
- Resilient messages publication management, temporary publication failures are automatically stored in a KVstore, and re-tried following a resilient policy

The application provides as well an easy logging access, a basic overview dashboard that exposes successful and failed publications, if any, and finally a builtin alert that can be activated to detect and warn in case of a failure to publish a message in a channel.

See https://ta-ms-teams-alert-action.readthedocs.io for more information.

The Add-on is compatible with Python 2 / Python 3 modes.

Release Notes

Version 1.0.16
June 18, 2020

Version 1.0.16

- Fix: Splunk Cloud vetting failure due to session token available in debug mode

Version 1.0.15
June 17, 2020

Version 1.0.15

- Fix: regression introduced in version 1.0.13 with the addition of a new parameter for SSL verification, if a deployment is upgraded from a previous version, the alert would fail until an admin enters the configuration UI and saves the configuration again

Version 1.0.14
June 14, 2020

Version 1.0.14

- Fix: Issue #20 Provides an option to disable SSL certificate verification (but enabled by default) to avoid failures with environments using SSL interception
- Feature: Issue #17 Provides an option on a per alert basis to allow ordering of the fields in the message by using the fields list ordering rather than alphabetical ordering
- Fix: SLIM error for app vetting due to the introduction of the targetWorkloads in app.manifest which requires version 2.0.0 of the app.manifest schema

Version 1.0.12
May 1, 2020

Version 1.0.12

- Fix: Default timed out value during REST calls are too short and might lead to false positive failures and duplicated creation of messages

Version 1.0.11
April 30, 2020

Version 1.0.11

- Change: For Splunk Cloud vetting purposes, enforce https verification in modalert_ms_teams_publish_to_channel_replay_helper.py
- Change: For Splunk Cloud vetting purposes, explicit Python3 mode in restmap.conf handler

Version 1.0.10
April 29, 2020

Version 1.0.10

- Change: For Splunk Cloud vetting purposes, SSL verification is now enabled for any external communications

Version 1.0.9
April 27, 2020

Version 1.0.9

- Fix: Provide an embedded role msteams_alert_action that can be inherited for non admin users to be allowed to fire the action and work with the resilient store feature

Version 1.0.7
April 26, 2020

Version 1.0.7

- Feature: Integration of the resilient store capabilities, which rely on a KVstore to automatically handle and retry temporary message creation failures with resiliency
- Feature: Overview dashboard update to reflect the resilient store integration, news reports and alerts
- Fix: Metadata avoid sharing alerts, reports and views at global level

Version 1.0.6
April 15, 2020

Version 1.0.6

- Fix: Proxy configuration was not working and not used
- Change: Overview dashboard switched to dark theme
- Change: Configure URL message update

Version 1.0.5
Feb. 14, 2020

Version 1.0.5

- Fix: Global settings are not properly use and do not define default values to be overridden on a per alert basis, this release fixes these issues
- Fix: Events iteration issue, if one was defining a massive alert with no by key throttling, building the Json object would fail
- Fix: Json escape character protection for OpenURI values (Open URL potential action)

Version 1.0.4
Feb. 9, 2020

Version 1.0.4

- Fix: Fields resulting from the Splunk search stored in the facts section of the message card were not ordered alphabetically properly, this is now fixed and fields are systematically sorted
- Feature: Allows activating a second openURL potential action per alert
- Feature: Allows defining an HttpPOST potential action in MS Teams per alert
- Fix: Better and shorter explanation of options

Version 1.0.3
Feb. 3, 2020

Version 1.0.3

- Fix: Order json object alphabetically before post operation to provide ordered fields in message publication.
- Fix: Sourcetype on non CIM deployments within saved searches and overview dashboard.
- Fix: Disable markdown support for text value fields to avoid being wrongly interpreted by Teams, in the context of Splunk we most likely want potentially piece raw block of text.

Version 1.0.2
Jan. 23, 2020

Version 1.0.2
- Fix: Timechart not working in overview to bad field name

Version 1.0.1
Jan. 20, 2020

Version 1.0.1

- Fix: avoids publication failure due to json illegal characters

Version 1.0.0
Jan. 19, 2020

Version 1.0.0:

Initial and first public release.

322
Installs
727
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.