Splunk Enterprise

Triggered Alert Monitoring of a search head using another search head

sureshkumaar
Path Finder

Hi,

 

Looking for a suggestion/query to monitor the triggered alerts of one particular search head (one Splunk URL) using another Splunk Search Head (another splunk URL)

With 4 fields included

_time, Alert Name, Mail notifications, results

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Search heads don't normally search each other.  However, if the SHs are forwarding their logs to the indexers (as they should) then you should be able to find the triggered alert in the audit log.  Try this search:

index=_audit action=alert_fired host=<one SH>
---
If this reply helps you, Karma would be appreciated.

sureshkumaar
Path Finder

Hi @richgalloway  - Thanks for providing the assistance

Actually i was looking for a query without index=audit as i don't have admin priviliges.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There is no way to access that data without the proper privileges.  There is a REST command to fetch fired alerts, but that won't work between search heads - only on the local SH or between the MC and SH.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer at Splunk .conf24 ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...

Share Your Ideas & Meet the Lantern team at .Conf! Plus All of This Month’s New ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...