Alerting

Best way to alert for not receiving data from a source?

j666gak
Communicator

Hello,

I was think of the possible ways to alert in Splunk whe it hos not received any data for a time period ie 30mins meaning the thedevice maybe down.

Has anybody already done this, or have any ideas?

Tags (3)
0 Karma

kristian_kolb
Ultra Champion

Have you check out the DeploymentMonitor app. It ships with Splunk, but is not enabled by default.

To enable it, go to Manager -> Apps and click 'enable' for the SplunkDeploymentMonitor

Then you can choose DeploymentMonitor in the 'Apps' menu (it will not have much data to show right away, since it works with scheduled searches). You can set up alerts for 'quiet' or 'missing' forwarders.

Hope this helps,

Kristian

kristian_kolb
Ultra Champion

Note that as of version 5, DeploymentMonitor has to be downloaded separately. This can be done through the Manager. /k

0 Karma

sdaniels
Splunk Employee
Splunk Employee

Check out this previous Splunkbase answer. You can create an alert based on that search. You'll just need to adjust the time to be 'age > 1800' for 30 minutes.

http://splunk-base.splunk.com/answers/3181/how-do-i-alert-when-a-host-stops-sending-data

| metadata index=main type=hosts | eval age = now()-lastTime | where age > (2*86400) | sort age d | convert ctime(lastTime) | fields age,host,lastTime

0 Karma
Get Updates on the Splunk Community!

Splunk is Nurturing Tomorrow’s Cybersecurity Leaders Today

Meet Carol Wright. She leads the Splunk Academic Alliance program at Splunk. The Splunk Academic Alliance ...

Part 2: A Guide to Maximizing Splunk IT Service Intelligence

Welcome to the second segment of our guide. In Part 1, we covered the essentials of getting started with ITSI ...

Part 1: A Guide to Maximizing Splunk IT Service Intelligence

As modern IT environments continue to grow in complexity and speed, the ability to efficiently manage and ...