Start Using PagerDuty Today
Try PagerDuty free for 14 days — no credit card required.
Splunk collects and indexes data from just about any source imaginable, such as network traffic, Web servers, custom applications, application servers, hypervisors, GPS systems, stock market feeds, social media, and preexisting structured databases.Splunk can be configured to pass all alerts to PagerDuty. Using PagerDuty, you can receive your Splunk alerts via phone call, SMS, or email; configure automatic escalation of alerts; escalate alerts right from your mobile phone; and set up on-call duty scheduling.
Note: This guide is for our python-based integration, which has since been replaced by our newer integration using Splunk’s native webhooks. You can find the new guide here.
First set up Splunk. You’ll also need a PagerDuty account (either a paid account or a free trial account will work).
From the Configuration menu, select Services.
On your Services page:If you are creating a new service for your integration, click +Add New Service.If you are adding your integration to an existing service, click the name of the service you want to add the integration to. Then click the Integrations tab and click the +New Integration button.
Select your app from the Integration Type menu and enter an Integration Name.If you are creating a new service for your integration, in General Settings, enter a Name for your new service. Then, in Incident Settings, specify the Escalation Policy, Notification Urgency, and Incident Behavior for your new service.
Click the Add Service or Add Integration button to save your new integration. You will be redirected to the Integrations page for your service.
Download & Install Splunk.
Enter your PagerDuty Integration key. This is referred to as your Service-API-Key in Splunk. Click Save:
Try PagerDuty free for 14 days — no credit card required.