Submitted by: Allen Sanabria
Description:
This ZenPack allows Splunk alerts to be sent to Zenoss as alerts; escalation can then be handled with Zenoss alerts. For a step by step walk-through and screencaps, see http://www.linuxdynasty.org/howto-send-splunk-alerts-to-zenoss-and-make-them-look-like-splunk.html
The ZenPack has the following Device Class(es)
Performance Template Splunk Example
/zport/dmd/Devices/rrdTemplates/Splunk Example Example usage of a Splunk data source.
DataSource Datapoint Description failedPasswords Number of failed passwords during the last 5 minutes. count Number of failed passwords during the last 5 minutes. Graph Splunk - Failed Passwords
Name Type Description count DataPointGraphPoint too many failures ThresholdGraphPoint
Screenshots:
Dependencies
Event Class Information
The Path column in the table is starting from the /Events class. The Code? column indicates if the Event Class contains a transform or not.
Path | Name | Type | Code? | Description |
---|---|---|---|---|
/App/Splunk | Splunk | Event Class | no | Destination event class for events related to the Splunk application. |
Installation Requirements:
- Zenoss Versions Supported:1.1.1
- External Dependencies:
- ZenPack Dependencies:
- Installation Notes:zenoss restart after installing this ZenPack.
- Configuration:
History:
Change History:
- 1.1.1 initial release
Tested:
Source: https://github.com/zenoss/Community-Zenpacks/tree/master/ZenPacks.community.Splunk/
Known issues: