Alerting

How to set alert schedule?

saifuddin9122
Path Finder

We have 15 different hosts, we enabled an alert with condition "if host is down we need to alert it".

It has to check every 5 min if any host is down. It has to alert it and also should not alert for second time for same host. How should I do it?

example: At 10:00 AM HostA is down we need to alert it and if at 10:01 HostA and HostB are down then I should get an alert saying HOSTB is down, but I should not receive alert for HOSTA again for 15mins.

Here is what we did, is it correct?

alt text

0 Karma

hardikJsheth
Motivator

You are using correct option. Throttle option will ensure alert is not generated again for same host. Only thing you may want to change is you need to put name of the field without equals sign. i.e. host

0 Karma

saifuddin9122
Path Finder

Thank you.

0 Karma

Spandreka
New Member

saifuddin, you can try in this way by loading up all the required host into a look up and append/join/lookup with the actual query for the host count(whcih represents host up or down) OR a particular message which lets you know host is down.

| inputlookup listof_hosts_alerts.csv
| append [search index= host=host*
| stats count by host]
| stats values(count) AS count by host
| fillnull value=0
| eval status=case(count>0,"Up", count=0, "Down", 1=1, UNKNOWN)
| fields - count
| search status=Down

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...