<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create time based alert? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589470#M13607</link>
    <description>&lt;P&gt;Start with the data. What events do you have ingested into splunk?&lt;/P&gt;</description>
    <pubDate>Thu, 17 Mar 2022 08:51:43 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2022-03-17T08:51:43Z</dc:date>
    <item>
      <title>How to create time based alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589431#M13606</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'd ask for a help on how to write a query where I need to get an alert "when there's a user added to a specific group and then removed from the group within 1 Hour time."&lt;/P&gt;
&lt;P&gt;I'm new to Splunk, any help appreciated.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 04:57:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589431#M13606</guid>
      <dc:creator>kvm</dc:creator>
      <dc:date>2022-03-17T04:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: How to create time based alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589470#M13607</link>
      <description>&lt;P&gt;Start with the data. What events do you have ingested into splunk?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 08:51:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589470#M13607</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-17T08:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: How to create time based alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589479#M13608</link>
      <description>&lt;P&gt;I have Microsoft Teams data.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 09:49:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589479#M13608</guid>
      <dc:creator>kvm</dc:creator>
      <dc:date>2022-03-17T09:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to create time based alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589486#M13609</link>
      <description>&lt;P&gt;Can you share some sample events (anonymised)?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 10:14:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589486#M13609</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-17T10:14:04Z</dc:date>
    </item>
    <item>
      <title>Re: How to create time based alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589492#M13610</link>
      <description>&lt;P&gt;Here it is,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;{"AADGroupId": "3100c98b-8326-454458-003423", "CommunicationType": "Team", "CreationTime": "2022-03-17T08:11:51", "ExtraProperties": [], "Id": "9a706da1-cf0-c66248e", "ItemName": "xxxxxxx", "Members": [{"DisplayName": "def, abc", "Role": 1, "UPN": "abc@teams.com"}], "&lt;STRONG&gt;Operation": "MemberAdded",&lt;/STRONG&gt; "OrganizationId": "e092a8e1", "RecordType": 25, "TeamGuid": "19:NMnHsgIOE_r6fULTi5XzydC9g1@thr.acv2", "TeamName": "xxxxxxx", "UserId": "abc@teams.com", "UserKey": "0b6cedcb-2a3386", "UserType": 0, "Version": 1, "Workload": "MicrosoftTeams"}&lt;/P&gt;&lt;P&gt;{"AADGroupId": "0158b60c-34ba9b", "CommunicationType": "Team", "CreationTime": "2022-03-17T08:39:08", "ExtraProperties": [], "Id": "24214374ab6", "ItemName": "yyyyyyyyyy", "Members": [{"DisplayName": "def, abc", "Role": 3, "UPN": "abc@teams.com"}], &lt;STRONG&gt;"Operation": "MemberRemoved",&lt;/STRONG&gt; "OrganizationId": "e092ae38-85aa8", "RecordType": 25, "TeamGuid": "19:ELsX6SdpXH5241@thr.acv2", "TeamName": "yyyyyyyyyy", "UserId": "abc@teams.com", "UserKey": "5f4381bd-7ed505", "UserType": 0, "Version": 1, "Workload": "MicrosoftTeams"}&lt;/P&gt;</description>
      <pubDate>Thu, 17 Mar 2022 10:31:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589492#M13610</guid>
      <dc:creator>kvm</dc:creator>
      <dc:date>2022-03-17T10:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to create time based alert?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589496#M13611</link>
      <description>&lt;P&gt;Assuming you have _time as the timestamp for the events, you can run a scheduled report over the last hour, say every 5 minutes and alert if you get any results&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;... your index
| spath Operation
| spath UserId
| eval timeadded=if(Operation="MemberAdded",_time,null())
| eval timeremoved=if(Operation="MemberRemoved",_time,null())
| stats values(timeadded) as timeadded values(timeremoved) as timeremoved by UserId
| where isnotnull(timeadded) AND isnotnull(timeremoved) and timeadded &amp;lt;= timeremoved&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 17 Mar 2022 11:10:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-time-based-alert/m-p/589496#M13611</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2022-03-17T11:10:37Z</dc:date>
    </item>
  </channel>
</rss>

