Set up Solarwinds alerts in ITSI
Prerequisites
- You must have Solarwinds installed. For more information, see the Solarwinds site.
Installation
- Select a Solarwinds product. For example, SolarWinds SAM.
- Download the setup file.
- Provision a Windows virtual machine.
- Run the setup exe file and follow the guided installation steps.
- Verify that Solarwinds is running by going to the Solarwinds Platform web console.
- Go to the web console and create a Solarwinds account, noting your username and password.
Configure Solarwinds
- Install the SolarWinds Add-on for Splunk.
- From the SolarWinds add-on, select the Configuration tab.
- Enter your Solarwinds username and password on the Account tab to authenticate the API.
- Enter the Solarwinds server and port in the "Add-on Settings" section.
- Change the port from
17778
to17774
. - Select the Input tab.
- Add the Solarwinds Alerts input. Set the initial start time for the input in the format
YYYY-MM-DD
andhh:mm:ss
. - Verify that alerts are ingested into Solarwinds.
SolarWinds webhook setup
- Log in to the Solarwinds web console.
- From the navigation menu, select the Alerts & Activity page.
- Click on "Alert Manager."
- Create a new alert, or edit an existing alert on the page.
- To create a new alert, select Add New Alert.
- To edit an existing alert, select the alert from the list and select Edit.
- In the Trigger Actions section, select Add Action.
- Select Send a GET or POST Request to a Web Server from the list of action types.
- Enter the URL for your Splunk HTTP Event Collector (HEC) endpoint. This typically follows the format:
http://<splunk-server>:8088/services/collector/event
. - Select Use HTTP/SPOST.
- Set the Body to POST to:
{ "event": { "Description": "${N=Alerting;M=AlertDescription}", "Message": "Component \"${N=SwisEntity;M=ApplicationAlert.ApplicationName}\" is ${N=Alerting;M=Severity}", "Uri": "${N=NTA.Alerting;M=NTA.SummaryPageUrl;F=NTALast30MinutesFromTimeTriggeredFormatter}" }, "sourcetype": "solarwinds:alerts" }
- Enter application/json as the content type.
- In the Authentication section, select Token. Set the fields to the following values:
- Header name: Authorization
- Header Value: Splunk <HEC Token>
- Select Save Changes.
Test Solarwinds alert
- On the Trigger Actions section, select the button under the Simulate column and select an alert to simulate. A success message confirms that the integration was properly set up.
- On the Search page in Splunk, you should begin to see data after running a search with your webhook as the source. For example:
.index=main sourcetype=*solarwinds:alert*
Set up Nagios alerts in ITSI | Set up Microsoft System Center Operations Manager alerts in ITSI |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.20.0
Feedback submitted, thanks!