Is there a way to detect in Splunk if a server was removed or deleted from the network?
You can set up a scripted input
to ping the forwarder (there are apps on Splunkbase for this) and setup an alert to let you know when any server is unreachable for a period of time. Also setup splunk WinEventLog://Security
from the servers to be forwarded into Splunk. Then you should be able to see the last person to login to that server, who should be the one who shut it down.
One option could be to ping the servers using a scripted input and index the output to Splunk. Then based on the output of the ping, you can detect if the servers is in network or not.
@Somesoni2,
Hi. The server is unreachable via ping. I am looking more towards who and when may have shut down the server. Any thoughts?