Alerting

Best way to alert for not receiving data from a source?

Communicator

Hello,

I was think of the possible ways to alert in Splunk whe it hos not received any data for a time period ie 30mins meaning the thedevice maybe down.

Has anybody already done this, or have any ideas?

Tags (3)
0 Karma

Ultra Champion

Have you check out the DeploymentMonitor app. It ships with Splunk, but is not enabled by default.

To enable it, go to Manager -> Apps and click 'enable' for the SplunkDeploymentMonitor

Then you can choose DeploymentMonitor in the 'Apps' menu (it will not have much data to show right away, since it works with scheduled searches). You can set up alerts for 'quiet' or 'missing' forwarders.

Hope this helps,

Kristian

Ultra Champion

Note that as of version 5, DeploymentMonitor has to be downloaded separately. This can be done through the Manager. /k

0 Karma

Splunk Employee
Splunk Employee

Check out this previous Splunkbase answer. You can create an alert based on that search. You'll just need to adjust the time to be 'age > 1800' for 30 minutes.

http://splunk-base.splunk.com/answers/3181/how-do-i-alert-when-a-host-stops-sending-data

| metadata index=main type=hosts | eval age = now()-lastTime | where age > (2*86400) | sort age d | convert ctime(lastTime) | fields age,host,lastTime

0 Karma