Skip to content

Commit 4286397

Browse files
authored
Merge pull request #378 from derkkila-splunk/AlertingWorkshopUpdate
Detector Alerts to ITSI in Alerting Workshop
2 parents 42a5c67 + 43cc66e commit 4286397

File tree

1 file changed

+56
-0
lines changed
  • content/en/ninja-workshops/12-alerting_monitoring_with_itsi/6-detectors-to-itsi

1 file changed

+56
-0
lines changed
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: Using Observability Cloud Detectors in ITSI
3+
linkTitle: 6. Using Observability Cloud Detectors in ITSI
4+
weight: 1
5+
---
6+
7+
## Part 2: Sending Alerts from Splunk Observability Cloud to Splunk ITSI
8+
9+
Since we have a detector configured in Splunk Observability Cloud that we set up earlier, the next step is to ensure that when it triggers an alert, this alert is sent to Splunk IT Service Intelligence (ITSI). This integration allows ITSI to ingest these alerts as notable events, which can then be correlated with other events and contribute to service health scores. The most common method to achieve this is by using a webhook in Splunk Observability Cloud to send alert data to an HTTP Event Collector (HEC) endpoint configured in Splunk ITSI.
10+
11+
**Step 1: Configure an HTTP Event Collector (HEC) in Splunk (ITSI)**
12+
13+
Before Splunk Observability Cloud can send alerts to ITSI, you need an HEC endpoint in your Splunk instance (where ITSI is running) to receive them.
14+
15+
1. Log in to your Splunk Enterprise or Splunk Cloud instance that hosts ITSI.
16+
2. Navigate to **Settings > Data Inputs**.
17+
3. Click on **HTTP Event Collector**.
18+
4. Click **Global Settings**. Ensure HEC is enabled. If not, enable it and specify a default port (e.g., 8088, though this might be managed differently in Splunk Cloud).
19+
5. Click **New Token**.
20+
6. Give your HEC token a descriptive name, for example, `o11y_alerts_for_itsi`.
21+
7. For **Source name override**, you can optionally specify a sourcetype, or leave it blank to specify it in Observability Cloud or let it default.
22+
8. For **Default Index**, select an appropriate index where ITSI can access these events. Often, there's a dedicated index for ITSI events, or you might use a general events index like `main` or `itsi_event_management`.
23+
9. Ensure the token is enabled and click **Submit**.
24+
10. Copy the **Token Value** that is generated. You will need this for the webhook configuration in Splunk Observability Cloud.
25+
26+
**Step 2: Configure a Webhook Integration in Splunk Observability Cloud**
27+
28+
Now, return to Splunk Observability Cloud to set up the webhook that will use the HEC token you just created.
29+
30+
1. In Splunk Observability Cloud, navigate to **Data Management > Available Integrations**.
31+
2. Look for an option to add a new **Splunk platform**.
32+
3. Give the Integration a name, for example, `Splunk ITSI HEC`.
33+
4. In the **URL** field, enter the HEC endpoint URI for your Splunk instance. This will typically be in the format `https://<your-splunk-hec-host-or-ip>:<hec-port>/services/collector/event`.
34+
5. You will need to add an **HEC token** that you created earlier.
35+
6. For the **Payload**, you need to construct a JSON payload that ITSI can understand. Splunk Observability Cloud provides an out of the box payload configured to include fields needed for ITSI event correlation.
36+
7. Review the Integration and click **Save**
37+
38+
**Step 3: Update the Detector to Use the Webhook**
39+
40+
Now, go back to the detector you created in Part 1 and update its notification settings to use the newly configured webhook.
41+
42+
1. Navigate to **Detectors & SLOs** in Splunk Observability Cloud.
43+
2. Find and edit the detector you created for EC2 CPU utilization.
44+
3. Click the Alert rule that we created earlier
45+
4. Go to the **Alert Recipients** section.
46+
5. Click **Add recipient > Splunk platform** and select the integration you just configured (`Splunk ITSI HEC`) for the desired alert severities (e.g., Critical, Warning).
47+
6. Save the changes to your detector.
48+
49+
**Step 4: Validate**
50+
51+
To test the integration, you can wait for a genuine alert to trigger or, if your detector settings allow, you might be able to manually trigger a test alert or temporarily lower the threshold to force an alert. Once an alert triggers in Splunk Observability Cloud, it should send the payload via the webhook to your Splunk HEC endpoint.
52+
53+
Verify in Splunk by searching your target index (e.g., `index=itsi_event_management sourcetype=o11y:itsi:alert host=<your-ec2-instance-id>`). You should see the event data arriving from Splunk Observability Cloud.
54+
55+
With these steps, alerts from your Splunk Observability Cloud detector are now being sent to Splunk ITSI. Correlating Events and generating Notables all function exactly the same as we covered earlier in this workshop.
56+

0 commit comments

Comments
 (0)