Splunk Enterprise

Triggered Alert Monitoring of a search head using another search head

sureshkumaar
Path Finder

Hi,

 

Looking for a suggestion/query to monitor the triggered alerts of one particular search head (one Splunk URL) using another Splunk Search Head (another splunk URL)

With 4 fields included

_time, Alert Name, Mail notifications, results

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Search heads don't normally search each other.  However, if the SHs are forwarding their logs to the indexers (as they should) then you should be able to find the triggered alert in the audit log.  Try this search:

index=_audit action=alert_fired host=<one SH>
---
If this reply helps you, Karma would be appreciated.

sureshkumaar
Path Finder

Hi @richgalloway  - Thanks for providing the assistance

Actually i was looking for a query without index=audit as i don't have admin priviliges.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There is no way to access that data without the proper privileges.  There is a REST command to fetch fired alerts, but that won't work between search heads - only on the local SH or between the MC and SH.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...

What's new in Splunk Cloud Platform 9.1.2312?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.1.2312! Analysts can ...

What’s New in Splunk Security Essentials 3.8.0?

Splunk Security Essentials (SSE) is an app that can amplify the power of your existing Splunk Cloud Platform, ...