<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Custom Alerting in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35897#M1565</link>
    <description>&lt;P&gt;"Particular Server Name" "Changed State to" (DOWN OR UP) | transaction fields="dvc,state" maxspan=180m startswith=Down endswith=Up keepevicted=t&lt;/P&gt;

&lt;P&gt;This assumes a few things:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; You are correctly extracting the server name as a field called "dvc".  Feel free to change that to whatever you want.&lt;/LI&gt;
&lt;LI&gt;The state (up or down) is being extracted as a field called "state".  Again, change that if you'd like.&lt;/LI&gt;
&lt;LI&gt;In "X amount of hours", X=3.  Adjust accordingly.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;If that search works correctly, save it and set up an alert.&lt;/P&gt;

&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Sep 2013 15:36:03 GMT</pubDate>
    <dc:creator>mloven_splunk</dc:creator>
    <dc:date>2013-09-13T15:36:03Z</dc:date>
    <item>
      <title>Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35894#M1562</link>
      <description>&lt;P&gt;I am currently sending all cisco ace load balancer syslogs to my splunk server.&lt;/P&gt;

&lt;P&gt;Within Splunk, I have two separate real-time alerts - one alert notifies me via email when a certain server goes down and a separate alert notifies me when the server comes back up. &lt;/P&gt;

&lt;P&gt;Is it possible to create a custom alert where I will only be notified if the server does not come back up after being down for more than X amount of hours? Receiving up down alerts is very annoying and sometimes there are so many emails, I wouldn't know if an up alert matches a down alert. &lt;/P&gt;

&lt;P&gt;If this is possible, how would I go about implementing it? Thanks&lt;/P&gt;

&lt;P&gt;To provide a little more detail, here is exactly what my real-time alerts look like:&lt;BR /&gt;
Alert 1 - "Particular Server Name" Changed State to DOWN - send email&lt;BR /&gt;
Alert 2 - "Particular Server Name" Changed State to UP - send email&lt;BR /&gt;
Where the server name is an arbitrary name of a server that wouldn't mean anything to anybody &lt;BR /&gt;
even if I did copy it directly from my alert. &lt;/P&gt;

&lt;P&gt;Sometimes the patching team fails to bring up a server properly and we find out the hard way when somebody complains. I actually have dozens of alerts just like this but for different servers. However, one solution would apply for all of my alerts. &lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2013 13:21:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35894#M1562</guid>
      <dc:creator>xxhavok1xx</dc:creator>
      <dc:date>2013-08-15T13:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35895#M1563</link>
      <description>&lt;P&gt;How do you know the server is down? I meant is there anything you do to know the status?&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2013 14:05:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35895#M1563</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-15T14:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35896#M1564</link>
      <description>&lt;P&gt;The cisco ace module has probe's configured on the device to check the status of any particular server. That probe information is generated in the syslogs. My alert's are based off of the probes that I see in splunk.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2013 15:23:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35896#M1564</guid>
      <dc:creator>xxhavok1xx</dc:creator>
      <dc:date>2013-08-15T15:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35897#M1565</link>
      <description>&lt;P&gt;"Particular Server Name" "Changed State to" (DOWN OR UP) | transaction fields="dvc,state" maxspan=180m startswith=Down endswith=Up keepevicted=t&lt;/P&gt;

&lt;P&gt;This assumes a few things:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; You are correctly extracting the server name as a field called "dvc".  Feel free to change that to whatever you want.&lt;/LI&gt;
&lt;LI&gt;The state (up or down) is being extracted as a field called "state".  Again, change that if you'd like.&lt;/LI&gt;
&lt;LI&gt;In "X amount of hours", X=3.  Adjust accordingly.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;If that search works correctly, save it and set up an alert.&lt;/P&gt;

&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2013 15:36:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35897#M1565</guid>
      <dc:creator>mloven_splunk</dc:creator>
      <dc:date>2013-09-13T15:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35898#M1566</link>
      <description>&lt;P&gt;By the way, if dvc and state aren't being extracted, you can do that within your search.&lt;/P&gt;

&lt;P&gt;"Particular Server Name" "Changed State to" (DOWN OR UP) | rex "^(&lt;DVC&gt;[^\s]+)\s" |rex "Changed\sState\to\s(&lt;STATE&gt;[^\s]+)" | transaction fields="dvc,state" maxspan=180m startswith=Down endswith=Up keepevicted=t&lt;/STATE&gt;&lt;/DVC&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Sep 2013 15:56:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35898#M1566</guid>
      <dc:creator>mloven_splunk</dc:creator>
      <dc:date>2013-09-13T15:56:17Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35899#M1567</link>
      <description>&lt;P&gt;Mike, per our discussion, here is what an actual log in splunk looks like.&lt;/P&gt;

&lt;P&gt;[Date] [Time] [Server IP] : [Tag]: Health Probe NY_HTTP:80_PROBE detected &lt;A href="https://community.splunk.com/interface%20vlan" target="_blank"&gt;Server Name&lt;/A&gt; in serverfarm NY_Serverfarm_01 changed state to UP&lt;/P&gt;

&lt;P&gt;Another example would be this:&lt;/P&gt;

&lt;P&gt;[Date] [Time] [Server IP] : [Tag]: Health Probe NY_HTTP:8080_PROBE detected &lt;A href="https://community.splunk.com/interface%20vlan" target="_blank"&gt;Server Name&lt;/A&gt; in serverfarm NY_Serverfarm_02 changed state to UP&lt;/P&gt;

&lt;P&gt;So you can see, we need "NY" and UP or DOWN to be extracted so it can be called out within your transaction field expression. We cant use server farms or server names because there are too many but the beginning of the probe is always the same - NY in this case. &lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:50:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35899#M1567</guid>
      <dc:creator>xxhavok1xx</dc:creator>
      <dc:date>2020-09-28T14:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35900#M1568</link>
      <description>&lt;P&gt;I assume that there are events that show a down message?  And that they're pretty much the same text as the up messages you posted (only with a "DOWN" at the end)?  &lt;/P&gt;

&lt;P&gt;So given an up message of this:&lt;BR /&gt;
[Date] [Time] [Server IP] : [Tag]: Health Probe NY_HTTP:80_PROBE detected &lt;A href="https://community.splunk.com/interface%20vlan" target="_blank"&gt;Server Name&lt;/A&gt; in serverfarm NY_Serverfarm_01 changed state to UP&lt;/P&gt;

&lt;P&gt;and a down message of this:&lt;BR /&gt;
[Date] [Time] [Server IP] : [Tag]: Health Probe NY_HTTP:80_PROBE detected &lt;A href="https://community.splunk.com/interface%20vlan" target="_blank"&gt;Server Name&lt;/A&gt; in serverfarm NY_Serverfarm_01 changed state to DOWN&lt;/P&gt;

&lt;P&gt;And you want to create a transaction based on an up message followed by a down message for the probe name (i.e. "NY")?  Is that correct?  If so, you'd want something like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"Health Probe" "changed state to" | rex "Health\sProbe\s(?&amp;lt;probe_name&amp;gt;[^_]+)_ | rex "changed\sstate\to\s(?&amp;lt;state&amp;gt;[^\$]+)$ | transaction  fields="probe_name,state" maxspan=180m startswith=UP endswith=DOWN keepevicted=t
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope that helps!&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:50:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35900#M1568</guid>
      <dc:creator>mloven_splunk</dc:creator>
      <dc:date>2020-09-28T14:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35901#M1569</link>
      <description>&lt;P&gt;Your assumptions are correct, there is an UP message for every DOWN... atleast there should be&lt;/P&gt;

&lt;P&gt;Specifically, I want an email sent out if an UP message is not received within 3 hours of seeing a DOWN message. This way admins can take action and bring it back up properly.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2013 14:38:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35901#M1569</guid>
      <dc:creator>xxhavok1xx</dc:creator>
      <dc:date>2013-09-24T14:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35902#M1570</link>
      <description>&lt;P&gt;Try this search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;"Health Probe" "changed state to" | rex "Health\sProbe\s(?&amp;lt;probe_name&amp;gt;[^_]+)_ | rex "changed\sstate\to\s(?&amp;lt;state&amp;gt;[^\$]+)$ | transaction  fields="probe_name,state"  startswith=UP endswith=DOWN keepevicted=t | search duration &amp;gt; 10800
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 24 Sep 2013 15:02:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35902#M1570</guid>
      <dc:creator>mloven_splunk</dc:creator>
      <dc:date>2013-09-24T15:02:52Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35903#M1571</link>
      <description>&lt;P&gt;Error in 'SearchParser': Missing a search command before '^'.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2013 16:03:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35903#M1571</guid>
      <dc:creator>xxhavok1xx</dc:creator>
      <dc:date>2013-09-24T16:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Custom Alerting</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35904#M1572</link>
      <description>&lt;P&gt;sorry, I forgot my closing quotes on the rex commands (or else Answers ate them).  at the end of each rex command, just before the pipes, put a closing quote.  You should be adding two quotes: one after +)_ and one after +)$&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2013 16:11:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Custom-Alerting/m-p/35904#M1572</guid>
      <dc:creator>mloven_splunk</dc:creator>
      <dc:date>2013-09-24T16:11:54Z</dc:date>
    </item>
  </channel>
</rss>

