Splunk (Webhook Integration)
Alerting Splunk with Webhooks
The Splunk integration allows Alerts to be delivered as messages to a http://www.splunk.com instance.
With Splunk, you can
Correlate Apica Synthetic monitoring events with multiple other systems
Use Splunk Search to locate incident alerts from keywords in the alert messages
Visualize data in Splunk's Dashboard
Note: The Apica Alerter Service uses the external address 194.213.119.5
, so you need to make sure that this address is accessible in your network is open for the alerting to work.
Â
- 1 Alerting Splunk with Webhooks
- 2 Creating a Splunk Target
- 2.1.1 Create Splunk Target
- 2.2 Add the Splunk Target; Fields
- 2.2.1 Target Name
- 2.2.2 Host
- 2.2.3 Username
- 2.2.4 Password
- 2.2.5 Source Type
- 2.2.6 Source
- 2.2.7 Message
- 2.2.8 Add Webhook Splunk Target
Creating a Splunk Target
Splunk Targets delivers alerts to a defined Splunk integration destination.
Step | Screenshot |
---|---|
Create Splunk Target
| |
A blank target is created | |
Select the Splunk Service | |
Add the Splunk Target; FieldsTarget Name
Host
Username
 | Note: For Splunk Cloud, see the Cloud Deployment section. More information on Source & Source Type, from Splunk Documentation: Password
For the following fields, you can use Alerts Message Placeholders in the title to add dynamic information. Source TypeThe Source Type field is used to mark data as a particular type. It can be used for data formatting and searches.
SourceThe Source field is used to identify where an event originated. It can be used for indexing and searches.
Message
|
Add Webhook Splunk TargetWhen you are happy with all the settings, you can create the target.
The Target is created, containing the selected user/targets. |
Â
Can't find what you're looking for? Send an E-mail to support@apica.io