Splunk Enterprise Security

How do I configure alerts for devices not reporting information to Splunk?

ruhernandezdai
New Member

I was wondering how to implement some kind of alert inside Splunk to identify those devices that have stopped sending remote syslogs to Splunk platform.

I will have a more proactive alert than the one I have at this moment. I am checking, for example, every 24 hours that no alert was sent by the device. But my question is, is there is any solution, like hearbeat or Keep-alive solution, for checking to see if I have problems with communication between the device originating the log and the Splunk infrastructure? I will appreciate any idea on how to implement a solution for this problem.

Thanks a lot!

0 Karma

prakash007
Builder
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...