icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

Thank You

Downloading Splunk Alerts for Microsoft Teams
SHA256 checksum (splunk-alerts-for-microsoft-teams_118.tgz) 717a2d8ef2dc35cea8c779b5ca981222e2f7cdb251d4df7a4a0ac3a922237ab7 SHA256 checksum (splunk-alerts-for-microsoft-teams_117.tgz) d73ce5b1b965083b65f68fbda61f3c874b9bdaa896d31c86199754d3a2ea5399
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Splunk Alerts for Microsoft Teams

Splunk Cloud
Splunk Built
Overview
Details
This application provides alert actions for Microsoft Teams messages publication to allow formatted messages publication from Splunk, including:

- Actionable message card support
- Defining options globally or on a per alert basis (per alert override)
- Defining comma separated list of fields which will be dynamically used to generated publication
- Choosing icon link for message publication
- Activating potential link action and defining its link (Up to 2 OpenURI actions per alert)
- Activating and configuring an HttpPOST potential action that allows additional interactions between Splunk or a third party application from Microsoft Teams
- Resilient messages publication management, temporary publication failures are automatically stored in a KVstore, and re-tried following a resilient policy

The application provides as well an easy logging access, a basic overview dashboard that exposes successful and failed publications, if any, and finally a builtin alert that can be activated to detect and warn in case of a failure to publish a message in a channel.

The Add-on is compatible with Python 2 / Python 3 modes.

Documentation for this add-on may be found at Splunk Docs

Release Notes

Version 1.1.8
June 16, 2025

First version of Splunk supported add-on, no new features or bug fixes

Version 1.1.7
Oct. 4, 2024

SHA-256: d73ce5b1b965083b65f68fbda61f3c874b9bdaa896d31c86199754d3a2ea5399

  • Splunk UCC, SDK and other librairies refresh to very last versions
  • Switch http.status_code verification from an explicit list of 2 codes to allow any 2 code, this change is to allow a workaround using Power Automate Flow to allow the deprecation of message cards by Microsoft.
  • Thanks to khanhduy8, a simple check box allows converting the message card format into the new adaptive card format to keep the app compatible with new MS format

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.