Splunk® App for Infrastructure (Legacy)

Use Splunk App for Infrastructure

Acrobat logo Download manual as PDF


This documentation does not apply to the most recent version of Splunk® App for Infrastructure (Legacy). For documentation on the most recent version, go to the latest release.
Acrobat logo Download topic as PDF

Using Alerts in Splunk App for Infrastructure

Use alerts to monitor for and respond to specific behavior in your data. Analysis Workspace alerts are based on a specific chart. Alerts use a scheduled search of chart data, and trigger when search results meet specific conditions.

For a video demonstration about alerts, see Video: Setting up and using alerts.

You need admin permissions to create alerts in the workspace.

View alerts in the Analysis Workspace

In the Analysis Workspace, click the Alerts tab in the left Data panel to view a list of alerts that were created in the Analysis Workspace. The Alerts tab includes alerts that you created and alerts that have been shared with you. Alerts are listed in a tree structure according to the data source they use. Click a data source name to see a list of alerts that are based on it.

For example, the following image shows an Analysis Workspace alert for the cpu.system metric.

AlertAnalysisWorkspace.png

View alerts from the Alerts tab

Click the Alerts tab in the menu bar to launch the Alerts page and to see a list of alerts that have been created in the Analysis Workspace. This page displays a list of the last 100 triggered alerts.

  • When you click an alert, a slideout panel displays on the right of the screen with detailed information about the alert.
  • In the slideout panel, click the This screen image shows the More icon. to access the Investigate button to drilldown to the Analysis Workspace and investigate the alert further.
Alerts tab.png


Parts of an alert

Alerts in the Analysis Workspace consist of an alert name, type ID, alert settings, trigger conditions, and trigger actions.

Trigger conditions

Set trigger conditions, or alert thresholds, to manage when an alert triggers. Trigger conditions consist of a data source, an aggregation to measure, and a threshold value.

Trigger actions

Configure trigger actions to manage alert responses. Select to notify someone by email based on trigger conditions. Specify a severity level to assign a level of importance to an alert. Severity levels can help you sort or filter alerts on the Alerts page. Available severity levels include Info, Low, Medium, High, and Critical.

Create an alert

  1. In the Main panel of the Analysis Workspace, select the chart for which you want to create an alert.
  2. Drag your cursor over a time area and data in the chart to pinpoint what data to use to create the alert.
  3. In the top-right corner of the chart, click the This screen image shows the More icon. icon.
  4. Click Create Alert to open the create alert dialog.
  5. A name for the alert is automatically generated for the alert, or you can enter a custom name for the alert following the character requirements.
  6. The Type Id and Metric are pre-populated, indicating the entity name and metric used.
  7. The details of the chart you selected to create an alarm are displayed.
  8. Set up trigger conditions. Trigger conditions include the aggregation, threshold, and throttle settings.
  9. Select notify options for when the alert triggers. Select to send an email and enter email address(es) for whom you want to notify if the alert triggers.
  10. Click Submit.

You have created an alert. To add the alert as a chart in the workspace, click Show Alert on the alert confirmation message.

Sending a notification when an alert triggers

When you create an alert, you can select to send a notification when the alert triggers. You can send an email notification, or use VictorOps to send an alert notification. Before sending a notification, the mail server settings must be configured by a user with admin privileges. See About Notifications in Splunk App for Infrastructure. This must be done by a user with admin privileges.

Edit an alert

Edit an alert to change threshold trigger conditions, or to add or change email recipients for notification for when the alert triggers.

  1. In the Analysis Workspace, in the alarm chart click the MoreOptions.png.
  2. Click Edit Alert.
  3. Edit the alert by changing threshold values or email addresses.
  4. Click Submit.

Alert details

Select an alert in the workspace to view its details. Alert details show in the analysis panel. These details include the settings, trigger conditions, and severity level configured for the alert.

Show triggered instances to see when alert conditions are met. Triggered instances appear as This screen image shows the triggered instance chart annotation. annotations on the chart, and up to 100 annotations can display on the chart.

To show triggered instances:

  1. In the Main panel, select the alert to show triggered instances for.
  2. In the Analysis panel under Settings, select Show triggered instances.

Triggered instance annotations appear at the time the alert triggers, not the precise time the alert threshold is crossed.

Use alert badges This screen image shows the gray alert badge. to gauge the alert severity level. To help you monitor alert activity, badge colors are based on the most recent severity level of a triggered alert.

Severity level Badge color
No trigger Gray
Info Blue
Low Green
Medium Yellow
High Orange
Critical Red

Example

The following alert shows CPU overutilization for the system.cpu metric.

This screen image shows a chart of an alert for CPU Overutilization for the cpu.system metric.


This alert is based on the aggregate average of system.cpu metric values. The blue alert badge indicates a severity level of Info. The horizontal blue line shows the alert threshold (1.0m). The This screen image shows the triggered instance chart annotation. annotations show triggered instances for the alert.

Last modified on 30 October, 2018
PREVIOUS
Analyze Entities and Groups with Splunk App for Infrastructure
  NEXT
Send an email alert notification in Splunk App for Infrastructure

This documentation applies to the following versions of Splunk® App for Infrastructure (Legacy): 1.2.0


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters