Set up Splunk Observability Cloud alerts in ITSI
Prerequisites
- You must set up Splunk Observability Cloud. For more information, see Get data into Splunk Observability Cloud.
Splunk Observability Cloud webhook setup
- Create a new HEC token that you will use to set up the Observability webhook. For more information about configuring an HEC token in Splunk, see Set up and use HTTP Event Collector in Splunk Web in the Splunk Enterprise Getting Data In guide.
- From Splunk Observability Cloud, select Data Management.
- Select the Available integrations tab.
- Select the Splunk platform tile.
- Configure the connection using the HEC URL and token created in the first step.
- The data is already formatted correctly for ITSI. Select Next.
Create a detector
- In Splunk Observability, navigate to the Detectors & SLOs page.
- Create a new detector that generates an alert for the metric that you want to measure. For more information about creating detectors, see [Create detectors to trigger alerts] in the Splunk Observability documentation.
- Set the Alert recipient to Splunk platform.
- Verify that alerts are sent to Splunk using HEC by running the search:
index="*" sflo_dimensions
Set up CloudTrail alerts in ITSI | Set up AppDynamics alerts in ITSI |
This documentation applies to the following versions of Splunk® IT Service Intelligence: 4.20.0
Feedback submitted, thanks!