<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How can I throttle the alerts by multiple field? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138066#M11697</link>
    <description>&lt;P&gt;What I did to accomplish my variant of the starting question was to output an eval-field from the search that I used as throttle field.&lt;/P&gt;

&lt;P&gt;| eval throttleId = a_field_from_the_search + "_" + another_field_in_the_search&lt;/P&gt;

&lt;P&gt;Throttle expression was then: throttleId&lt;/P&gt;

&lt;P&gt;The eval-field could use just about any logic, the threadstarter would possibly use the replace(X,Y,Z) function to strip out the log number.&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 14:02:52 GMT</pubDate>
    <dc:creator>datorsmurf</dc:creator>
    <dc:date>2020-09-29T14:02:52Z</dc:date>
    <item>
      <title>How can I throttle the alerts by multiple field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138061#M11692</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;

&lt;P&gt;How can I throttle the alerts by multiple field? &lt;BR /&gt;
For example, I would like to throttle the alerts if and only if both "src_ip" "dst_IP" "msg" are matched in log1 and log3&lt;/P&gt;

&lt;P&gt;log1.   src_ip=1.1.1.1 dst_ip=2.2.2.2 msg=attack1&lt;BR /&gt;
 log2.   src_ip=1.1.1.1 dst_ip=3.3.3.3 msg=attack1&lt;BR /&gt;
 log3.   src_ip=1.1.1.1 dst_ip=2.2.2.2 msg=attack1&lt;BR /&gt;
 log4.   src_ip=1.1.1.1 dst_ip=2.2.2.2 msg=attack2&lt;/P&gt;

&lt;P&gt;My expected alert results are&lt;BR /&gt;
alert1.  src_ip=1.1.1.1 dst_ip=2.2.2.2 msg=attack1&lt;BR /&gt;
alert2.  src_ip=1.1.1.1 dst_ip=3.3.3.3 msg=attack1&lt;BR /&gt;
alert3.   src_ip=1.1.1.1 dst_ip=2.2.2.2 msg=attack2&lt;/P&gt;

&lt;P&gt;BR&lt;BR /&gt;
Victor&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:54:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138061#M11692</guid>
      <dc:creator>victorxbox</dc:creator>
      <dc:date>2020-09-28T18:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: How can I throttle the alerts by multiple field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138062#M11693</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;Could you please elaborate more, as per my understanding you could make use  of logical operator OR as per the following query:&lt;/P&gt;

&lt;P&gt;(source=log1 src_ip=1.1.1.1) OR (source=log3 dst_ip="2.2.2.2")&lt;/P&gt;

&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:54:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138062#M11693</guid>
      <dc:creator>aakwah</dc:creator>
      <dc:date>2020-09-28T18:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: How can I throttle the alerts by multiple field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138063#M11694</link>
      <description>&lt;P&gt;Hello aakwah,&lt;/P&gt;

&lt;P&gt;Under "action option" in the alert item, can i put more than one field in  "suppress results containing field value"?&lt;/P&gt;

&lt;P&gt;BR&lt;BR /&gt;
Victor&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 02:31:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138063#M11694</guid>
      <dc:creator>victorxbox</dc:creator>
      <dc:date>2015-02-18T02:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: How can I throttle the alerts by multiple field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138064#M11695</link>
      <description>&lt;P&gt;It would actually be the AND logical operator, as stated in the question, if they both match.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 10:14:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138064#M11695</guid>
      <dc:creator>markthompson</dc:creator>
      <dc:date>2015-02-18T10:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: How can I throttle the alerts by multiple field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138065#M11696</link>
      <description>&lt;P&gt;Hi Victor,&lt;BR /&gt;
When you create your alert, you should use an AND operator in your search string, for example I would use an IF statement to set a field, e.g. SendAlert, to a boolean value of 0 or 1, then from the results trigger an alert if SendAlert is equal to 1.&lt;/P&gt;

&lt;P&gt;I hope this helps, if not, let me know and I'll come up with something else.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 10:16:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138065#M11696</guid>
      <dc:creator>markthompson</dc:creator>
      <dc:date>2015-02-18T10:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: How can I throttle the alerts by multiple field?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138066#M11697</link>
      <description>&lt;P&gt;What I did to accomplish my variant of the starting question was to output an eval-field from the search that I used as throttle field.&lt;/P&gt;

&lt;P&gt;| eval throttleId = a_field_from_the_search + "_" + another_field_in_the_search&lt;/P&gt;

&lt;P&gt;Throttle expression was then: throttleId&lt;/P&gt;

&lt;P&gt;The eval-field could use just about any logic, the threadstarter would possibly use the replace(X,Y,Z) function to strip out the log number.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 14:02:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-can-I-throttle-the-alerts-by-multiple-field/m-p/138066#M11697</guid>
      <dc:creator>datorsmurf</dc:creator>
      <dc:date>2020-09-29T14:02:52Z</dc:date>
    </item>
  </channel>
</rss>

