All Apps and Add-ons

Ping Monitor Results

davidirvine
New Member

Hi,

I am using the Network Toolkit to ping site routers on our MPLS network.
We currently have 3 Runs (pings) every 1m to the routers IP address.
We then have a real-time alert as follows:
sourcetype="ping_input" packet_loss=100
| stats max(dest) as Host max(packet_loss) as "Packet Loss"

We are getting lots of results back for 100% packet loss, however if we run a continual ping from the Splunk Server (centos) we dont get any packet loss?
Looking for some assistance with how this should be setup?

thanks
David

0 Karma
1 Solution

nickhills
Ultra Champion

The odd packet can always get a bit lost along the way, so you may want to use stats avg(packet_loss) and set a threshold |where "Packet Loss">75 to avoid some of the false positives.

You also probably want to avoid real time scheduled searches (see: https://answers.splunk.com/answers/734767/why-are-realtime-searches-disliked-in-the-splunk-w.html )

instead try using a historic search earliest=-2m@m latest=-1m@m

sourcetype="ping_input" earliest=-2m@m latest=-1m@m
| stats max(dest) as Host avg(packet_loss) as "Packet Loss"
|where "Packet Loss">75
If my comment helps, please give it a thumbs up!

View solution in original post

nickhills
Ultra Champion

The odd packet can always get a bit lost along the way, so you may want to use stats avg(packet_loss) and set a threshold |where "Packet Loss">75 to avoid some of the false positives.

You also probably want to avoid real time scheduled searches (see: https://answers.splunk.com/answers/734767/why-are-realtime-searches-disliked-in-the-splunk-w.html )

instead try using a historic search earliest=-2m@m latest=-1m@m

sourcetype="ping_input" earliest=-2m@m latest=-1m@m
| stats max(dest) as Host avg(packet_loss) as "Packet Loss"
|where "Packet Loss">75
If my comment helps, please give it a thumbs up!

davidirvine
New Member

Thanks Nick.
I have updated the Search and will monitor it.
Appreciate the link too.

0 Karma

davidirvine
New Member

Hi Nick,
Apologies for the delayed response.
That search brings up the desired results however the Alert I configured from it doesn't seem to trigger?
Have set the Alert with the same time frame as the search.
Any ideas?

Alert Type = Scheduled
Run Cron = earliest 2m latest 1m
Number of results > 0

thanks David

0 Karma

nickhills
Ultra Champion

Are you using -2m or just 2m?
You need the -

If my comment helps, please give it a thumbs up!
0 Karma

davidirvine
New Member

yes I have -2m and -1m

0 Karma

nickhills
Ultra Champion

If you run a historical search in Splunk over the last hour or so - do you still see results for packet loss?
If so, can you post some of the events?

If my comment helps, please give it a thumbs up!
0 Karma

davidirvine
New Member

Hi Nick,

Thanks for responding.
I searched for the last hour and got one result which was True as the host was restarted.
I expanded the search for Today and got some results which was a False Positive, but no others?
Looking through the amount of Alerts I received today I had 19.
Here are some events:
25/03/2019
13:30:04.000

sent=1 received=0 packet_loss=100 min_ping=NA avg_ping=NA max_ping=NA jitter=NA return_code=1 dest=router01.megt.com.au
host = splunk source = ping sourcetype = ping_input
25/03/2019
13:01:03.000

sent=1 received=0 packet_loss=100 min_ping=NA avg_ping=NA max_ping=NA jitter=NA return_code=1 dest=router02.megt.com.au
host = splunk source = ping sourcetype = ping_input

Thanks

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...