Splunk Logo

Splunk Integration Guide

Splunk provides a powerful platform for searching, monitoring and analyzing machine generated data. It allows organizations prevent major issues and stay resilient when problems manifest. It can be configured to identify errors periodically or in real time through logs or user device activity. TaskCall integrates with Splunk to bring the alerts to the forefront. As alerts are piped by Splunk, TaskCall’s on-call management directs them to the correct on-call responder and our incident response system orchestrates the fastest possible resolution.

Pointers
  • The integration is between a TaskCall service and Splunk.
  • This integration only allows alerts to be received in TaskCall from Splunk.
In TaskCall
  1. Go to Configurations > Services . Select the service you want to integrate with.
  2. Once you are on the Service details page, go to the Integrations tab. Click on New Integration.
  3. Give the integration a name.
  4. From the integration types, select the top radio button indicating that you are trying to use a built-in integration.
  5. From the list of built-in integrations, select Splunk.
  6. Click Save.
  7. Copy the Integration Url that is issued for the integration.
In Splunk
  1. Alerts in Splunk are configured from saved searches. Render the search you want to set up the alert from. Click on the Save As dropdown on the top right corner of the search results page and then click Alert.

    Splunk Integration Step 1

  2. Configure the alert. Give it a name, describe it and set the schedule when the alert should run.
  3. In the Trigger Actions section at the bottom, click Add Actions and select Webhook. Paste the integration URL that you copied over from TaskCall here.

    Splunk Integration Step 2

  4. Click Save when you are done.
You can repeat the same steps for other alerts to pipe them to TaskCall.
On this page