Splunk Alert Notification
Last updated
Last updated
This section explains how to receive ThousandEyes alert notifications in Splunk using custom webhooks.
Log in to Splunk.
Create an HTTP Event Collector (HEC) token in your Splunk instance:
Identify the target endpoint based on your Splunk deployment:
Splunk Cloud Platform:
Splunk Enterprise:
In the ThousandEyes platform, go to Integrations and click + New Integration in the top right.
In the Add New Integration side panel that opens, select Custom Webhook.
Fill in the fields as follows:
Name: Enter a descriptive name for this integration.
URL: Use the target endpoint identified in the previous step.
Preset Configuration: Select Splunk.
Headers: Add the following key-value pairs:
Content-Type
: application/json
Authorization
: Splunk <HEC Token>
Click Test to verify the webhook:
If successful, you will see "Testing completed successfully!".
If the test fails:
Click Save to save the integration.
Reopen the integration and test it again.
Verify that the HEC target and token are correct.
If the test still fails, contact ThousandEyes support.
Click Save.
Apply the webhook to existing alert rules using the Manage Alert Rules panel.
Log in to Splunk.
When an alert is triggered, search for the event using the following query: index="*" eventType="THOUSANDEYES_ALERT_NOTIFICATION"
Sample Output:
Some fields, such as itsiDrilldownURI
and app
, are required for Splunk IT Service Intelligence (ITSI) application. Splunk ITSI will receive ThousandEyes alerts, analyze them, and aggregate them with other events.
For more information on configuring webhooks, see Custom Webhooks.