Splunk® IT Service Intelligence

Event Analytics Manual

Set up Nagios alerts in ITSI

Prerequisites

  • You must have Nagios installed. Follow the documentation relevant to your operating system and see Installing Nagios Core from Source from the Nagios knowledge base documentation.

Installation

Follow these steps to set up this integration:

  1. Install Nagios on a virtual machine. Follow the documentation relevant to your operating system: Installing Nagios Core from Source.
  2. Run the commands to install the configuration files relevant to your operating system.
  3. Configure the integration and create users and groups, as described in the Nagios documentation.
  4. Run the command to start the web server. For example, sudo systemctl start nagios.service

Configure Nagios

  1. Configure Nagios to prepare your Nagios instance for the add-on:
  2. Configure log inputs for the Splunk Add-on for Nagios Core.
  3. Install the Splunk Add-on for Nagios Core. For more information, see Install the Splunk Add-on for Nagios Core.
  4. Restart Splunk.
Last modified on 19 February, 2025
Available data integrations in ITSI   Set up Solarwinds alerts in ITSI

This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.20.0


Please expect delayed responses to documentation feedback while the team migrates content to a new system. We value your input and thank you for your patience as we work to provide you with an improved content experience!

Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters