Splunk Enterprise

Help with splunk query to alert server status from down to up?

vinothkumark
Path Finder

Hi All,

I have created an alert which checks the status of the server and if it down, then alert will be triggered. 

Query: 
index=performance host=hostname1  source!=sar status!=UP | dedup hostname | table hostname status

Sample Event:
2023-05-10 17:50:18 hostname1 server is DOWN
2023-05-10 17:55:18 hostname2 server is DOWN

Now, I want to create an alert whenever the status changes from DOWN to UP.
Can someone help with query?

Thanks.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your requirement is a bit loose.

What you could do is write the current state to a summary index or lookup store and every time you check the status, you compare it to the previous value you saved, then trigger your alert if the status changes.

Alternatively, you could check every 5 minutes looking back say 10 minutes and check whether there is an earlier state that was DOWN and a later state that is UP

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...