<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create a search condition in Splunk where an alert is based on result? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441168#M5945</link>
    <description>&lt;P&gt;I want to get alerts for the situations which are different from below conditions:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Server  a   B   C   D
condition   ü  ü  X   X
                    X      X    ü  ü
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I want to check Splunk, for the above servers, if this condition is there then it's ok- otherwise, it will alert us via email.&lt;/P&gt;

&lt;P&gt;PS: The above condition means either a and B is UP and C and D is down or A and B is Down and C and D is UP. &lt;BR /&gt;
If there are any other conditions like all are UP or all are DOWN or A and C are UP or many more condition then it will alert us.&lt;/P&gt;

&lt;P&gt;But I am not able to use Splunk to set this condition, can anyone please help me with this?&lt;/P&gt;

&lt;P&gt;I am not sure if we can use LOOKUP table to check this one.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jun 2019 10:31:33 GMT</pubDate>
    <dc:creator>ruchijain</dc:creator>
    <dc:date>2019-06-25T10:31:33Z</dc:date>
    <item>
      <title>How to create a search condition in Splunk where an alert is based on result?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441168#M5945</link>
      <description>&lt;P&gt;I want to get alerts for the situations which are different from below conditions:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Server  a   B   C   D
condition   ü  ü  X   X
                    X      X    ü  ü
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I want to check Splunk, for the above servers, if this condition is there then it's ok- otherwise, it will alert us via email.&lt;/P&gt;

&lt;P&gt;PS: The above condition means either a and B is UP and C and D is down or A and B is Down and C and D is UP. &lt;BR /&gt;
If there are any other conditions like all are UP or all are DOWN or A and C are UP or many more condition then it will alert us.&lt;/P&gt;

&lt;P&gt;But I am not able to use Splunk to set this condition, can anyone please help me with this?&lt;/P&gt;

&lt;P&gt;I am not sure if we can use LOOKUP table to check this one.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 10:31:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441168#M5945</guid>
      <dc:creator>ruchijain</dc:creator>
      <dc:date>2019-06-25T10:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a search condition in Splunk where an alert is based on result?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441169#M5946</link>
      <description>&lt;P&gt;Hi @ruchijain,&lt;/P&gt;

&lt;P&gt;I'm assuming you have a table that looks as follows :&lt;BR /&gt;
A B C D &lt;BR /&gt;
u u X X &lt;BR /&gt;
u u u X&lt;BR /&gt;
u X X X&lt;BR /&gt;
X X u u &lt;/P&gt;

&lt;P&gt;If that's the case then something like this will return all the events you need :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;YourBaseSearch ( A=u B=u C=X D=X) OR ( A=X B=X C=u D=u) 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Adding NOT will return all the events that should alert you :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;YourBaseSearch NOT ( ( A=u B=u C=X D=X) OR ( A=X B=X C=u D=u) )
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you want you can share a sample event so I can help you build a search that's closer to what you will be using.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 10:37:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441169#M5946</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-06-25T10:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a search condition in Splunk where an alert is based on result?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441170#M5947</link>
      <description>&lt;P&gt;sample is right as below:&lt;/P&gt;

&lt;P&gt;currently A and B is showing service status as status =running (sourcetype=service_stutus ---&amp;gt; where i am using service jboss status)&lt;BR /&gt;
C and D are editorial servers and not running so status is stopped&lt;/P&gt;

&lt;P&gt;I want to run the query when A and B are running and C and D are stopped or vice versa (A and B are stopped and C and D are running)&lt;BR /&gt;
For rest of the status combination it should sent the alert&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 10:54:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441170#M5947</guid>
      <dc:creator>ruchijain</dc:creator>
      <dc:date>2019-06-25T10:54:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to create a search condition in Splunk where an alert is based on result?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441171#M5948</link>
      <description>&lt;P&gt;sample is right as below:&lt;/P&gt;

&lt;P&gt;currently A and B is showing service status as status =running (sourcetype=service_stutus ---&amp;gt; where i am using service jboss status)&lt;BR /&gt;
C and D are editorial servers and not running so status is stopped&lt;/P&gt;

&lt;P&gt;I want to run the query when A and B are running and C and D are stopped or vice versa (A and B are stopped and C and D are running)&lt;BR /&gt;
For rest of the status combination it should sent the alert&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 11:21:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/How-to-create-a-search-condition-in-Splunk-where-an-alert-is/m-p/441171#M5948</guid>
      <dc:creator>ruchijain</dc:creator>
      <dc:date>2019-06-25T11:21:09Z</dc:date>
    </item>
  </channel>
</rss>

