Alerting

i have four servers and how to send alert when servers is down using inputlookup?

karthi2809
Builder

created lookup xx.csv i added four servers in the lookup file

| inputlookup xx.csv | eval count=0| table Host count| append [search[| inputlookup xx.csv]| stats count by Host]| stats sum(count) as Count by Host| where Count = 0
Tags (2)
0 Karma

woodcock
Esteemed Legend

Like this:

| metadata type=hosts index=<YourIndexName>
| appendpipe [|inputlookup xxx.csv | eval lastTime = 0]
| dedup host
| eval lastDataDuration=(now()-lastTime)/60
| where lastDataDuration>YourThreshHoldIntegerNumberOfMinutesHere

niketn
Legend

There could be several streamlined methods of finding out if a host is down or is not sending events. Following are couple of those:

Using metadata command for scenario where your Host is running but Data is not getting in to SPLUNK (Created alert for a periodic schedule and time range like last 15 min etc)

| metadata type=hosts index=_internal
| eval lastEventDuration=(now()-lastTime)/60
| where lastDuration>15

Using REST API (provided you have access) for situation where host itself is down which would stop pinging Splunk server:

| rest /service/deployment/server/clients
| eval lastPingDuration=(now()-lastTime)/60
| where lastPingDuration>15
____________________________________________
| makeresults | eval message= "Happy Splunking!!!"
0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...