<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: wanted to use Splunk to get notification/alerts whenever service goes down or hung in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476459#M8400</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/43640"&gt;@sachindarade&lt;/a&gt;,&lt;BR /&gt;
I think that you already have Splunk Universal Forwarder on these servers, otherwise you have to install it on all.&lt;/P&gt;

&lt;P&gt;The first step is (if you haven't yet) to download Splunk_TA_Windows ( &lt;A href="https://splunkbase.splunk.com/app/742/" target="_blank"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt; ).&lt;BR /&gt;
then you have to edit &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; file changing in &lt;CODE&gt;[WinHostMon://Process]&lt;/CODE&gt; room the option &lt;CODE&gt;disabled = 0&lt;/CODE&gt;&lt;BR /&gt;
Then you have to deploy this modified TA to all your servers.&lt;BR /&gt;
In this way you should receive a list of  active processes on your servers with the frequency you have in &lt;CODE&gt;[WinHostMon://Process]&lt;/CODE&gt; room (default 600 seconds).&lt;/P&gt;

&lt;P&gt;Now you should create a lookup (called e.g. services.csv) containing all the processes of each host (two columns: host Name) that you want to monitor.&lt;/P&gt;

&lt;P&gt;At least you have to run a search like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=windows sourcetype=WinHostMon Type=Process host="BKKLT00067" Name="*"
| eval host=lower(host), Name=lower(name)
| stats count BY host Name
| append [ | inputlookup services.csv | eval host=lower(host), Name=lower(name), count=0 | fields host Name count ]
| stats sum(count) As total BY host Name
| where total=0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In this way you'll have the list of all services for each host never found.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 04:14:52 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2020-09-30T04:14:52Z</dc:date>
    <item>
      <title>wanted to use Splunk to get notification/alerts whenever service goes down or hung</title>
      <link>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476458#M8399</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;

&lt;P&gt;I am new to Splunk. I have few windows services in our environment. Sometime those services get hung or stopped automatically.&lt;BR /&gt;
I wanted to use Splunk to get notification/alerts whenever service goes down or hung. If somebody can share any steps that would really appreciated.&lt;/P&gt;

&lt;P&gt;Thanks in Advance!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2020 15:25:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476458#M8399</guid>
      <dc:creator>sachindarade</dc:creator>
      <dc:date>2020-02-19T15:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: wanted to use Splunk to get notification/alerts whenever service goes down or hung</title>
      <link>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476459#M8400</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/43640"&gt;@sachindarade&lt;/a&gt;,&lt;BR /&gt;
I think that you already have Splunk Universal Forwarder on these servers, otherwise you have to install it on all.&lt;/P&gt;

&lt;P&gt;The first step is (if you haven't yet) to download Splunk_TA_Windows ( &lt;A href="https://splunkbase.splunk.com/app/742/" target="_blank"&gt;https://splunkbase.splunk.com/app/742/&lt;/A&gt; ).&lt;BR /&gt;
then you have to edit &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; file changing in &lt;CODE&gt;[WinHostMon://Process]&lt;/CODE&gt; room the option &lt;CODE&gt;disabled = 0&lt;/CODE&gt;&lt;BR /&gt;
Then you have to deploy this modified TA to all your servers.&lt;BR /&gt;
In this way you should receive a list of  active processes on your servers with the frequency you have in &lt;CODE&gt;[WinHostMon://Process]&lt;/CODE&gt; room (default 600 seconds).&lt;/P&gt;

&lt;P&gt;Now you should create a lookup (called e.g. services.csv) containing all the processes of each host (two columns: host Name) that you want to monitor.&lt;/P&gt;

&lt;P&gt;At least you have to run a search like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=windows sourcetype=WinHostMon Type=Process host="BKKLT00067" Name="*"
| eval host=lower(host), Name=lower(name)
| stats count BY host Name
| append [ | inputlookup services.csv | eval host=lower(host), Name=lower(name), count=0 | fields host Name count ]
| stats sum(count) As total BY host Name
| where total=0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In this way you'll have the list of all services for each host never found.&lt;/P&gt;

&lt;P&gt;Ciao.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 04:14:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476459#M8400</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-30T04:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: wanted to use Splunk to get notification/alerts whenever service goes down or hung</title>
      <link>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476460#M8401</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Similarly, i have another requirement.where I have pass log directory to forwarder. Now i want to read the logs and generate the alerts when log file contains "file(s) count is 2" or greater than 1. (condition is : File(s) count is greater than 1)&lt;/P&gt;

&lt;P&gt;your help would be really appreciated.&lt;/P&gt;

&lt;P&gt;Thanks in Advance. &lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 14:07:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/wanted-to-use-Splunk-to-get-notification-alerts-whenever-service/m-p/476460#M8401</guid>
      <dc:creator>sachindarade</dc:creator>
      <dc:date>2020-03-02T14:07:28Z</dc:date>
    </item>
  </channel>
</rss>

