Deployment Architecture

Splunk Alerts generated through Service now incident..

vijreddy30
Loves-to-Learn Everything

Hi Team,

In my requirement, if any splunk servers are got failed, need to be generated Services now incidents need to be created automatically...

 

How do we write the query and how do we configure Service now incidents, please help me 

 

 

Labels (2)
0 Karma

vijreddy30
Loves-to-Learn Everything

Hi Team,

 

I am trying to below query, it showing the all servers are up, I tested one server stopped and checked  it's not showing Down status, please fine the below query

index="_internal"
| eval host=lower(host)
| stats count BY host
| append [ | eval host=lower(host) ]
| eval status=if(total=0,"Down","up")
| table host status

 

Please letme know exact query on that.

0 Karma

marnall
Motivator

You would probably find the splunk Add-on for ServiceNow useful: https://splunkbase.splunk.com/app/1928

As for the query, you could compare the list of splunk server names active now versus the servers active a few days ago. e.g.

index=_internal host="*splunknamescheme*" OR host IN (splunkserver1, splunkserver2) earliest=-3d latest=-2d 
| dedup host 
| table host
| search NOT [search index=_internal host="*splunknamescheme*" OR host IN (splunkserver1, splunkserver2) earliest=-1d
| dedup host 
| table host]

 Then you can add an Alert Action to the alert and make it create an incident: https://docs.splunk.com/Documentation/AddOns/released/ServiceNow/Usecustomalertactions

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...