Alerting

splunk time problem

aalaa
Path Finder

Hello ,

We have a problem between the time of the splunk and the time of the events cisco probably :

We create a real-time alert about changing the status of switches or routers interfaces.

Based on dashboards at the Cisco Network application :

Search = "sourcetype =" cisco: ios "src_int! =" "Host =" * "| stats count by _time, host, src_int, port_status | where port_status =" up "OR port_status =" down "

We create this alert to send each email the port status change from "UP to down" or "down to UP" in real time.

I have tested several times changing the status of a switch interface but i don't receive any triggered alert , according to the support analysis we observed that the problem is in the difference between the time of the splunk and the time of the events cisco not in the configuration of the alert .

Lastes event cisco : 10:03
Time splunk : 09:03

So any help please ?

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi aalaa,
probably there's a timezone problem: on cisto you have summer time and not in Splunk, you havew to adjust the timezones.
Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...