Splunk Enterprise

Triggered Alert Monitoring of a search head using another search head

sureshkumaar
Path Finder

Hi,

 

Looking for a suggestion/query to monitor the triggered alerts of one particular search head (one Splunk URL) using another Splunk Search Head (another splunk URL)

With 4 fields included

_time, Alert Name, Mail notifications, results

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Search heads don't normally search each other.  However, if the SHs are forwarding their logs to the indexers (as they should) then you should be able to find the triggered alert in the audit log.  Try this search:

index=_audit action=alert_fired host=<one SH>
---
If this reply helps you, Karma would be appreciated.

sureshkumaar
Path Finder

Hi @richgalloway  - Thanks for providing the assistance

Actually i was looking for a query without index=audit as i don't have admin priviliges.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

There is no way to access that data without the proper privileges.  There is a REST command to fetch fired alerts, but that won't work between search heads - only on the local SH or between the MC and SH.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...