Set up AppDynamics alerts in ITSI
Prerequisites
- You must install Cisco AppDynamics. For more information, see Getting Started.
Installation
- Install the Splunk Add-on for AppDynamics. Follow the steps in Install the Splunk Add-on for AppDynamics.
- From the Search page in ITSI, input the following search to confirm that your events are being ingested:
sourcetype=appdynamics_events
Set up AppDynamics webhook
- Configure the Splunk Add-on for AppDynamics by following the steps in the Configure the Splunk Add-on for AppDynamics topic.
- Configure inputs for the add-on by following the steps in the Configure inputs in the Splunk Add-on for AppDynamics topic.
Test the AppDynamics webhook
- Select your new template from the HTTP Request Templates page.
- Select Test.
- In the modal, add the Health Rule Violation Started - Warning event.
- Select Run Test and check that the test runs successfully.
- On the Search page in Splunk, you should begin to see data after running a search with your webhook as the source.
Add template to policy in AppDynamics
- From the Alert & Respond menu, select Policies.
- Create a new policy, or select an existing policy.
- From the Actions tab, select the + plus sign to create a new action.
- From the modal, select Create.
- Select Make an HTTP Request.
- Select Ok.
- Select the Splunk request template that you previously created. To create a request template, see Set up AppDynamics webhook.
- Select Save. Any health rule violations will now send alerts to Splunk.
Set up Splunk Observability Cloud alerts in ITSI | Set up Cisco ThousandEyes alerts in ITSI |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.20.0
Feedback submitted, thanks!