Alerting

Best way to alert for not receiving data from a source?

j666gak
Communicator

Hello,

I was think of the possible ways to alert in Splunk whe it hos not received any data for a time period ie 30mins meaning the thedevice maybe down.

Has anybody already done this, or have any ideas?

Tags (3)
0 Karma

kristian_kolb
Ultra Champion

Have you check out the DeploymentMonitor app. It ships with Splunk, but is not enabled by default.

To enable it, go to Manager -> Apps and click 'enable' for the SplunkDeploymentMonitor

Then you can choose DeploymentMonitor in the 'Apps' menu (it will not have much data to show right away, since it works with scheduled searches). You can set up alerts for 'quiet' or 'missing' forwarders.

Hope this helps,

Kristian

kristian_kolb
Ultra Champion

Note that as of version 5, DeploymentMonitor has to be downloaded separately. This can be done through the Manager. /k

0 Karma

sdaniels
Splunk Employee
Splunk Employee

Check out this previous Splunkbase answer. You can create an alert based on that search. You'll just need to adjust the time to be 'age > 1800' for 30 minutes.

http://splunk-base.splunk.com/answers/3181/how-do-i-alert-when-a-host-stops-sending-data

| metadata index=main type=hosts | eval age = now()-lastTime | where age > (2*86400) | sort age d | convert ctime(lastTime) | fields age,host,lastTime

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...