Splunk ITSI

Create e-mail alerts for inactive and unstable entities

rmo23
Explorer

Hi guys!

how to proceed to create alerts on inactive and unstable entities .

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @rmo23 ,

as also @yuanliu said, you should share more details about your infrastructure.

Anyway, in ITSI there's an asset inventory that should be complete (otherwise you have a very bigger issue!).

So,  you could use the lookup containing these asset (I don' t remember its name) and run a search like the following:

| tstats 
     count
     where index=*
     BY host
| append [ | inputlookup your_asset_lookup | eval count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0

Ciao.

Giuseppe

rmo23
Explorer

hi
Indeed, thanks to ITSI, I can have data on the metrics, the status of my servers, active or inactive, I can predict the status of my infrastructure, etc. I just want to receive email alerts only when my servers are inactive, I only see this status when I'm in ‘Entity Overview’ if it's possible to configure an email alert on it.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @rmo23 ,

at first see if there is the way (I don't know very deeply ITSI) to enable as action the email sending.

If not extract the search from this dashboard and create a custom alert.

Ciao.

Giuseppe

0 Karma

yuanliu
SplunkTrust
SplunkTrust

Until you can tell us what data you have, what field/value in that data indicates inactive and unstable entities, and how you want the output to look like, volunteers are not going to help you.

0 Karma

rmo23
Explorer

hi
I manage to monitor the servers divided into services via the ITSI.
However, I would like to receive email alerts when some of my servers change state, either inactive or unstable, for better reactivity.

0 Karma

proyleJDS
Path Finder

You could use a search like this to check if the entities mapped in a service are receiving events within a specified time frame, if not you could consider them unstable and alert

| inputlookup itsi_entities append=true 
| rename services._key as service_key 
| rename title as entity 
| fields entity, service_key 
| where isnotnull(service_key) 
| mvexpand service_key 
| inputlookup service_kpi_lookup append=true 
| eval key=coalesce(service_key,_key) 
| stats values(entity) as host, values(title) as service by key 
| mvexpand host 
| dedup host 
| fields host 
| eval host=lower(host) 
| join type=outer host 
    [| metadata type=hosts index=_internal 
    | eval host=lower(host) 
    | eval status = if(lastTime>now()-180,1,0)] 
| eval status=if(status=1,1,0)

 

Get Updates on the Splunk Community!

Introducing Splunk Enterprise Security 8.0!

Join us on Wednesday, November 20 to learn about Splunk Enterprise Security 8.0!To enhance SOC efficiency, ...

Mastering Threat Hunting

Register to watch Mastering Threat Hunting on Monday, November 18Join us for an insightful talk where we dive ...

Upcoming Community Maintenance: 10/28

Howdy folks, just popping in to let you know that the Splunk Community site will be in read-only mode ...