<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert for port up or port down,... in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27133#M230</link>
    <description>&lt;P&gt;As Bob and MHibbin have commented, this is a little vague.  Remember, Splunk is first and foremost a data indexing and search engine.  By default, it has few ways to &lt;STRONG&gt;generate&lt;/STRONG&gt; data.  You have to give it some data to process.  Once there is data to process, then alerting on it is easy.  In my opinion, you have skipped to the "how do I alert on this?" question before you've properly analyzed "how do I get this data into Splunk?".&lt;/P&gt;

&lt;P&gt;There are two common approaches for "Port up" and "Port down" data -- one is syslog, the other is an SNMP trap.  Most devices that can run an SNMP agent are able to produce &lt;CODE&gt;linkUp&lt;/CODE&gt; and &lt;CODE&gt;linkDown&lt;/CODE&gt; traps.  With a running &lt;CODE&gt;snmptrapd&lt;/CODE&gt;, you can feed those traps as events into Splunk.  From there, you can alert on them fairly easily.  This is documented at &lt;A href="http://docs.splunk.com/Documentation/Splunk/4.3.1/Data/SendSNMPeventstoSplunk"&gt;http://docs.splunk.com/Documentation/Splunk/4.3.1/Data/SendSNMPeventstoSplunk&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Also, this may be use -- &lt;A href="http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094aa5.shtml"&gt;http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094aa5.shtml&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The syslog approach is pretty simple too, but you have to have devices that you can count on giving you a syslog event from an interface up/down.  &lt;/P&gt;

&lt;P&gt;Remember that Splunk's architecture is quite different from your average "network monitoring" solution - its focus is on indexing and searching the data, and less on collection / acquisition.&lt;/P&gt;</description>
    <pubDate>Sun, 15 Apr 2012 18:18:34 GMT</pubDate>
    <dc:creator>dwaddle</dc:creator>
    <dc:date>2012-04-15T18:18:34Z</dc:date>
    <item>
      <title>Alert for port up or port down,...</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27129#M226</link>
      <description>&lt;P&gt;Is there some way that we can configure &lt;STRONG&gt;port up&lt;/STRONG&gt; and &lt;STRONG&gt;down alert&lt;/STRONG&gt;. since there seems to be none there by default and neither one comes while setting up an alert, does one needs to write it down in the &lt;STRONG&gt;$SPLUNK_HOME/etc/system/README/savedsearches.conf&lt;/STRONG&gt; ?&lt;/P&gt;

&lt;P&gt;If so can anybody guide in that respect.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Apr 2012 13:00:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27129#M226</guid>
      <dc:creator>sahil_singh</dc:creator>
      <dc:date>2012-04-14T13:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for port up or port down,...</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27130#M227</link>
      <description>&lt;P&gt;Hi Sahil.&lt;/P&gt;

&lt;P&gt;This question is a bit vague. What port are you interested in monitoring (Router, Switch Firewall, Windows or Unix Server)? Is it being logged and is splunk picking up the events?&lt;/P&gt;

&lt;P&gt;Once you have identified the events, you can write a search and save it as an alert. This can be done through the GUI (web) or in a config file. If you are new to splunk, I would do it in the web interface, search app.  You should never edit the files in a /README/ or /default/ folder. If you decide to do it in the config file, I would recommend you edit (or add) it in &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/etc/apps/search/local/savedsearches.conf
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Bob&lt;/P&gt;</description>
      <pubDate>Sat, 14 Apr 2012 13:36:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27130#M227</guid>
      <dc:creator>BobM</dc:creator>
      <dc:date>2012-04-14T13:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for port up or port down,...</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27131#M228</link>
      <description>&lt;P&gt;the question here is more in terms of monitoring the physical ports such as Ethernet 1 and Ethernet 2.&lt;/P&gt;

&lt;P&gt;One needs that alerts could generated immediately,once these ports are down.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Apr 2012 07:47:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27131#M228</guid>
      <dc:creator>sahil_singh</dc:creator>
      <dc:date>2012-04-15T07:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for port up or port down,...</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27132#M229</link>
      <description>&lt;P&gt;I think BobM was asking about the device because there are different methods for collecting the required information.&lt;/P&gt;

&lt;P&gt;For example, you could set-up a scripted input that pings the interface (why not use the most basic of network t-shooting tools), and just have an alert when there are no echo replies.&lt;/P&gt;

&lt;P&gt;If the device has syslog (e.g. a Cisco router) that generates this information, you could forward the Syslog to Splunk and alert on that.&lt;/P&gt;

&lt;P&gt;You should work on getting the data into Splunk first... read these docs here:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Data/WhatSplunkcanmonitor"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Data/WhatSplunkcanmonitor&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Once you have decided on how you get the data in, you should then set work to setting the alerts up for yourself.. docs here:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Admin/howdoesalertingworkinSplunk"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Admin/howdoesalertingworkinSplunk&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;There is rarely one single answer to a question in Splunk, the best thing in my opinion would be to work on a method which you know/understand enough to develop further.&lt;/P&gt;

&lt;P&gt;Regards,&lt;/P&gt;

&lt;P&gt;MHibbin&lt;/P&gt;</description>
      <pubDate>Sun, 15 Apr 2012 09:42:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27132#M229</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2012-04-15T09:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for port up or port down,...</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27133#M230</link>
      <description>&lt;P&gt;As Bob and MHibbin have commented, this is a little vague.  Remember, Splunk is first and foremost a data indexing and search engine.  By default, it has few ways to &lt;STRONG&gt;generate&lt;/STRONG&gt; data.  You have to give it some data to process.  Once there is data to process, then alerting on it is easy.  In my opinion, you have skipped to the "how do I alert on this?" question before you've properly analyzed "how do I get this data into Splunk?".&lt;/P&gt;

&lt;P&gt;There are two common approaches for "Port up" and "Port down" data -- one is syslog, the other is an SNMP trap.  Most devices that can run an SNMP agent are able to produce &lt;CODE&gt;linkUp&lt;/CODE&gt; and &lt;CODE&gt;linkDown&lt;/CODE&gt; traps.  With a running &lt;CODE&gt;snmptrapd&lt;/CODE&gt;, you can feed those traps as events into Splunk.  From there, you can alert on them fairly easily.  This is documented at &lt;A href="http://docs.splunk.com/Documentation/Splunk/4.3.1/Data/SendSNMPeventstoSplunk"&gt;http://docs.splunk.com/Documentation/Splunk/4.3.1/Data/SendSNMPeventstoSplunk&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Also, this may be use -- &lt;A href="http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094aa5.shtml"&gt;http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094aa5.shtml&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The syslog approach is pretty simple too, but you have to have devices that you can count on giving you a syslog event from an interface up/down.  &lt;/P&gt;

&lt;P&gt;Remember that Splunk's architecture is quite different from your average "network monitoring" solution - its focus is on indexing and searching the data, and less on collection / acquisition.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Apr 2012 18:18:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-for-port-up-or-port-down/m-p/27133#M230</guid>
      <dc:creator>dwaddle</dc:creator>
      <dc:date>2012-04-15T18:18:34Z</dc:date>
    </item>
  </channel>
</rss>

