All Apps and Add-ons

Create an episode 1 to 1 that alerts you every time a new host goes inactive

LuísMSB
New Member

Hello,
I have the Unix/Linux Add-on installed in my Splunk Cloud.
This Add-on gives me a list of Inactive Hosts.
How do I create an episode 1 to 1 that alerts me every time a new host goes inactive?

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @LuísMSB,

in the Community, you can find thousands of answers to this question!

Anyway, you have two choices:

  • create a lookup containing the perimeter to monitor,
  • checks if an host sent logs in the last 30 days and didn't send in the last hour

in the first case, you have to create a lookup called perimeter.csv and containing at least one column (host), then you can run a search like the following

| tstats 
     count
     WHERE index=* 
     BY host
| append [ | inputlookup perimeter.csv | eval count=0 | fields host count ]
| stats 
     sum(count) AS total
     BY host
| where total=0

if instead you don't want to manage a lookup, you can use this search

| tstats 
     latest(_time) AS _time
     count
     WHERE index=* earliest=-30d@d latest=now
     BY host
| eval period=if(_time<now()-3600,"previous","latest")
| stats 
     dc(period) AS period_count
     values(period) AS period
     BY host
| where period_count=1 AND period="previous"

I prefer first solution because gives you more control.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Building Momentum: Splunk Developer Program at .conf25

At Splunk, developers are at the heart of innovation. That’s why this year at .conf25, we officially launched ...