<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Enterprise logs monitoring in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628605#M107883</link>
    <description>&lt;P&gt;Grazie Giusepppe.&lt;/P&gt;</description>
    <pubDate>Fri, 27 Jan 2023 12:55:12 GMT</pubDate>
    <dc:creator>tonitoagu</dc:creator>
    <dc:date>2023-01-27T12:55:12Z</dc:date>
    <item>
      <title>Splunk Enterprise logs monitoring: How do you create those alerts and assigned them to someone to be follow up on?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628524#M107869</link>
      <description>&lt;P&gt;I am wondering if anyone has this issue or use case. We are trying to see if we can have a system that would alert us on when a host has stopped sending logs based on the specific index it belongs. For example: We woudl like to know if a firewall has stopped sending logs within 30min and also lets say if a host for another less continuos feed has stopped, exmaple: host A of index=trickle_feed has not send in 4 hours, etc.&lt;/P&gt;
&lt;P&gt;We are good with the logic on those searches, what i am really looking for is direction on how you create those alerts and assigned them to someone to be follow up on? what other tools you might be using for the triaging and tracking of the alert/incident/ticket/work while the feed for the Quiet host is being restored?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 19:32:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628524#M107869</guid>
      <dc:creator>tonitoagu</dc:creator>
      <dc:date>2023-01-26T19:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628528#M107870</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253266"&gt;@tonitoagu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;let me understand:you want to be alerted when events from one host stop to arrive, is this correct?&lt;/P&gt;&lt;P&gt;if this is your need, you an find many examples in the community (also by me!).&lt;/P&gt;&lt;P&gt;Anyway, you have to list all the hosts to monitor in a lookup (called e.g. perimeter.csv) containing at least one column (host) and then run a search like the following:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| metasearch index=*
| eval host=lower(host)
| stats count BY host
| append [ | inputlookup perimeter.csv | eval host=lower(host), count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 18:18:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628528#M107870</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-26T18:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628530#M107871</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;thank you so much. I think i got the searches working for alerting what devices have stopped.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My problem at this time is figuring out a way to act on those alerts. so on your example, do you konw how you would assign those hosts in the .csv to be looked and track while they are resolved?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 18:41:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628530#M107871</guid>
      <dc:creator>tonitoagu</dc:creator>
      <dc:date>2023-01-26T18:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628531#M107872</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253266"&gt;@tonitoagu&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;usually in this kind of projects, it's a best practice to define a monitoring perimeter before starting the project.&lt;/P&gt;&lt;P&gt;But anyway, you can run a search on e.g. the last 30 days and extract all the host of your network and then store this list in the lookup.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 18:44:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628531#M107872</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-26T18:44:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628535#M107873</link>
      <description>&lt;P&gt;There are already apps for that.&lt;/P&gt;&lt;P&gt;For example - &lt;A href="https://splunkbase.splunk.com/app/4621" target="_blank"&gt;https://splunkbase.splunk.com/app/4621&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 19:07:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628535#M107873</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-01-26T19:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628605#M107883</link>
      <description>&lt;P&gt;Grazie Giusepppe.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 12:55:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628605#M107883</guid>
      <dc:creator>tonitoagu</dc:creator>
      <dc:date>2023-01-27T12:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628606#M107884</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/253266"&gt;@tonitoagu&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;if one answer solves your need, please accept one answer for the other people of Community or tell us how we can help you.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the Contributors;-)&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jan 2023 13:00:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/628606#M107884</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-01-27T13:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/629344#M107957</link>
      <description>&lt;P&gt;I will definitely take a look at this!&lt;BR /&gt;&lt;BR /&gt;Thanks so much!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 14:03:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/629344#M107957</guid>
      <dc:creator>tonitoagu</dc:creator>
      <dc:date>2023-02-02T14:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Enterprise logs monitoring</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/629368#M107962</link>
      <description>&lt;P&gt;With this TrackMe app you could “outsource” configuration of alerts to responsible groups from splunk admins &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2023 16:33:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Enterprise-logs-monitoring-How-do-you-create-those-alerts/m-p/629368#M107962</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-02-02T16:33:05Z</dc:date>
    </item>
  </channel>
</rss>

