Monitoring Splunk

Help Newbie to Design a Monitoring solution

hsimpson2016
New Member

Hi,
I am a newbie with a task to implement a monitoring functionality on Splunk. The requirement is for Splunk to be able to monitor an application 's live logs where each line in the logs have a format with multiple fields such as timestamp.

  • Each entry is an event that occurs in the application being monitored.
  • Each event is conceptually grouped together as a processing session that occurs in the application by virtue of the same file these events are operating on. There is no built in/native session Id like in HttpSession. (the application being monitored is not a web application).
  • Each session can consist of multiple events.
  • There are events that must come in pairs (Event A occurs and must be followed with Event B within 5 minutes). Otherwise, an email must be sent to notify the on-call by email about this.

From my understanding of Splunk so far, the best way I can think of is to implement is to:

  • Group events into transactions since that is the best way for Splunk to handle a session.
  • Create an alert that checks each event that must be in pairs in the transactions is paired with the arrival of the second event must occur within 5 minutes. Otherwise, sends an email.
  • The alert runs the search every 1 minute for events happening within the last 24 hours

If so, how do I handle the following requirements:

  • How do provide the on-call a way to tell Splunk that the offending events raised by the alert is being handled. Hence, don't keep sending an email? Is there a way to create a screen on Splunk to handle this?
  • How about if an offending event cannot be handled within 24 hours, how do I make Splunk forgets about the event will fall outside the 24 hour coverage of the alert's search? How do I store the list of the offending events in Splunk? in otherwords, how Splunk maintains a state for an alert?

Sorry for the long post and I thank you ahead for any help!

Thanks

Tags (1)
0 Karma

skoelpin
SplunkTrust
SplunkTrust

Welcome to Splunk answers @hsimpson2016

You will need to set up a Universal Forwarder and configure your inputs.conf stanza to monitor log files on a remote server. You will then need to set up your outputs.conf file to point to your indexer. These will live in splunk/etc/system/local.. Once you do this then start splunk, the log files will start to roll into Splunk in sub-second time. To add a timestamp to events, you will need to add a break_only_before command to your props.conf file which lives on the indexer. You can tie these events together at index time or search time, this all depends on your setup.

We have an index which has SOAP web service calls. Each call has a request and response with a matching unique GUID and we treat them as separate events. We tie the events together at search time using the transaction command and have an alert set anything the difference in time is greater than 300ms. So to answer your question, yes you can send an email if an event has a duration longer than 5 minutes assuming these events have a unique identifier tied in to them.

To prevent Splunk from spamming your inbox with emails, you can throttle the alerts. So an example of this would be, if you got an alert coming in every 3 seconds, you could throttle the alerting within a 10 minute window so you would only get 1 alert every 10 minutes until the issue is resolved. I'm not sure about Splunk maintaining an alert, but you could always trigger a script which could maintain the state for you

0 Karma
Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...