Splunk® App for Infrastructure (Legacy)

Administer Splunk App for Infrastructure

Acrobat logo Download manual as PDF


This documentation does not apply to the most recent version of Splunk® App for Infrastructure (Legacy). For documentation on the most recent version, go to the latest release.
Acrobat logo Download topic as PDF

Create and modify alerts in Splunk App for Infrastructure

Use alerts to monitor and respond to specific events. Alerts trigger when alert thresholds set for a metric on an entity or group meet specific conditions. Creating an alert includes:

  • Create an alert, or multiple alerts for a group, entity or metric.
  • Set thresholds for the alert to trigger.
  • Set to receive an alert notification, such as by email or a VictorOps notification.
  • Once an alert is created, and thresholds are met or exceeded, the alert displays in the Alerts overview.
  • Open the alert chart to investigate alert instances.
  • Edit alert settings.

Video: Setting up and using alerts

For a video demonstration about setting up and using alerts, see Video: Setting up and using alerts.

Create an alert

Prerequisites
Before creating an alert and sending an alert notification, the Notification server settings must be configured, as defined in Configure Alert Notification Settings in Splunk App for Infrastructure.

Steps

  1. Select an entity or group you want to investigate and drill down to the Analysis Workspace.
  2. Select a metric chart for which you want to create an alert.
  3. (Optional). If you have selected to create an alert for a group, click Select All By for the metric you want to split (for example, host).
  4. (Optional) Drag your cursor over a time area and data in the chart to pinpoint what data to use to create the alert.
  5. In the top-right corner of the chart, click the This screen image shows the More icon. icon.
  6. Click Create Alert.
    • Note: If you do not see the Create Alert link, you might not be logged in as a user with permissions to create alerts. The metrics panel also needs to contain data in order to create an alert and access the Create Alert link.
      SAI Create alert121.png
  7. In the Create Alert dialog set alert thresholds. The alert chart in the dialog visually displays the thresholds.
      SAI Create alert dialog121.png
    • A name for the alert is automatically generated for the alert, or you can enter a custom name for the alert following the character requirements.
    • The Type Id and Metric are pre-populated, indicating the entity name and metric used.
    • The details of the chart you selected to create an alert display.
    • Set up trigger conditions, which are threshold settings. Available severity levels include Info, Medium, and Critical.
    • Select Notify if options for when the alert triggers. See Configure Alert Notification Settings in Splunk App for Infrastructure.
  8. Click Submit. The alert is added to the Alerts dropdown in the Data section of the Analysis Workspace and displays on the Alert page if triggered.

Edit an alert

Edit an alert to change threshold trigger conditions, or to add or change email recipients for notification for when the alert triggers.

  1. In the Analysis Workspace > Data > Alerts section, click a metric alert.
  2. In the chart for the alert, click the MoreOptions.png.
  3. Click Edit Alert.
  4. In the Edit Alert dialog, you can edit the alert name, threshold values and alert notification information.
  5. Click Submit.
Last modified on 06 December, 2018
PREVIOUS
Configure alert notification settings in Splunk App for Infrastructure
  NEXT
Configure Email Notifications in Splunk App for Infrastructure

This documentation applies to the following versions of Splunk® App for Infrastructure (Legacy): 1.2.0, 1.2.1


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters