Splunk Notes: Difference between revisions

From Federal Burro of Information
Jump to navigationJump to search
No edit summary
No edit summary
Line 13: Line 13:


  host="10.35.12.161" NOT "slapd"
  host="10.35.12.161" NOT "slapd"
==sending alerts to scripts==
http://wiki.splunk.com/Community:Use_Splunk_alerts_with_scripts_to_create_a_ticket_in_your_ticketing_system
To do this, set up your saved search, put it on a schedule, and set the action to trigger a shell script you've written whenever the number of events you're interested in is> 0. 
   
Put your script (not the Remedy script) in <code>/opt/splunk/bin/scripts</code>. 
   
This script should call the Java program that Remedy uses to generate tickets and pass it data from the Splunk alert. 
Splunk alerts support the following variables:
* $1 = number of events returned
* $2 = search terms
* $3 = fully qualified search string
* $4 = name of the saved search
* $5 = the reason the action/script was triggered (for example, the number of events returned was >1)
* $6 = a link to the saved search in Splunk + 
* $7 = a list of the tags belonging to this saved search (this option was removed starting in Splunk 3.6)
* $8 = path to a file where raw results of this search are located (as opposed to passing the actual results into the ticket--this could be a lot of data). 
The following example script passes the reason the script was triggered, a link to the saved search, and the path to the search results file into the ticket that the <code>generateRemedyTicket</code> Remedy script creates when it's run.

Revision as of 18:17, 8 May 2013

host="10.35.12.1" | stats count by action, host

Fortigate by country:

host="10.35.12.1" | stats count by src_country

log lines by time

host="10.35.12.161" | chart count by _time

grep -v

host="10.35.12.161" NOT "slapd"

sending alerts to scripts

http://wiki.splunk.com/Community:Use_Splunk_alerts_with_scripts_to_create_a_ticket_in_your_ticketing_system

To do this, set up your saved search, put it on a schedule, and set the action to trigger a shell script you've written whenever the number of events you're interested in is> 0.

Put your script (not the Remedy script) in /opt/splunk/bin/scripts.

This script should call the Java program that Remedy uses to generate tickets and pass it data from the Splunk alert. Splunk alerts support the following variables:

  • $1 = number of events returned
  • $2 = search terms
  • $3 = fully qualified search string
  • $4 = name of the saved search
  • $5 = the reason the action/script was triggered (for example, the number of events returned was >1)
  • $6 = a link to the saved search in Splunk +
  • $7 = a list of the tags belonging to this saved search (this option was removed starting in Splunk 3.6)
  • $8 = path to a file where raw results of this search are located (as opposed to passing the actual results into the ticket--this could be a lot of data).

The following example script passes the reason the script was triggered, a link to the saved search, and the path to the search results file into the ticket that the generateRemedyTicket Remedy script creates when it's run.