You can install the Splunk integration to post data to Moogsoft AIOps when an alert occurs.
The Splunk integration does not support authentication options and security certificate bypass is not supported when the app is in the default SSL mode.
See the Splunk documentation for more information.
The Splunk integration has been validated with Splunk v. 6.5, v. 6 6 and v. 7.0. Before you start to set up your integration, ensure you have met the following requirements:
Configure the Splunk integration in Moogsoft AIOps as follows:
Follow the instructions to create an integration name.
See the Splunk Integration Reference for advanced configuration information.
Log in to Splunk and install the Add-on for Moogsoft AIOps in order to send alerts from Splunk to Moogsoft AIOps.
Install the add-on from Apps in the console or from Splunkbase, the Splunk marketplace.
If using on-premises of Splunk and Moogsoft AIOps, copy the server.key and the server.pem files to <splunk_home>/etc/apps/TA-Splunk-Moogsoft/bin.
Configure the triggers for Splunk alerts to be forwarded to the integration as follows:
<url of the integration>
|Alert Severity||Enter a severity. Clear, Indeterminate, Minor, Major, Critical.|
|Moogsoft AIOps Certificate||Enter your certificate location if using an on-premises version of Moogsoft AIOps and Splunk. Otherwise leave empty.|
After you complete the configuration, Splunk sends new alerts to Moogsoft AIOps.