<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kafka stream alert in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668358#M15488</link>
    <description>&lt;P&gt;Yes all event .but some are json format&lt;/P&gt;</description>
    <pubDate>Sun, 12 Nov 2023 17:13:12 GMT</pubDate>
    <dc:creator>Pravinsugi</dc:creator>
    <dc:date>2023-11-12T17:13:12Z</dc:date>
    <item>
      <title>Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668353#M15486</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have 2 string which need to be searched in splunk both string having different index and different source type.one string is "published sourcing plan " and another string is "published transfer order" .I need to get "published transfer order" log from the splunk.if it's not available after 5 min of getting "published sourcing plan "log in the splunk.i need to count it or need to retrieve some details like salesorderid from "published sourcing order" log .how to prepare sea rch query in splunk.incase none of the log available in the splunk for "transfer order published",I need to capture the things &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 16:29:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668353#M15486</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-12T16:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668355#M15487</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262404"&gt;@Pravinsugi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you provide sample events with sensitive information redacted?&lt;/P&gt;&lt;P&gt;Do you have two event types?&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;"published sourcing plan"&lt;/LI&gt;&lt;LI&gt;"published transfer order"&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Or do you have four event types?&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;"published sourcing plan"&lt;/LI&gt;&lt;LI&gt;"published transfer order"&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;"published sourcing order"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;"transfer order published"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN&gt;Is the salesorderid field extracted from all event types or only from&amp;nbsp;"published sourcing order?"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 16:58:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668355#M15487</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2023-11-12T16:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668358#M15488</link>
      <description>&lt;P&gt;Yes all event .but some are json format&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 17:13:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668358#M15488</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-12T17:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668359#M15489</link>
      <description>&lt;P&gt;Can you provide sample events?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 17:15:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668359#M15489</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2023-11-12T17:15:16Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668360#M15490</link>
      <description>&lt;P&gt;For example&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) One index and one source type and search string is "hello" "how" "where".here each search string will give common log as "id" and "name"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) once done with all 3 search string (hello,how,where).within in next 5 min ,one log should present in splunk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3)that log contain "completed" as string which also have "id" and "name".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4) incase after 5 min,"completed" string is not available in the splunk log,I want to retrieve"id" and "name" from my "hello",how,where string search result .pls help me with search query.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 17:38:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668360#M15490</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-12T17:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668361#M15491</link>
      <description>&lt;P&gt;Could you please anyone help me on this?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 18:08:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668361#M15491</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-12T18:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668377#M15492</link>
      <description>&lt;P&gt;Without actual sample events, this may not match your use case exactly, but it's a starting point.&lt;/P&gt;&lt;P&gt;I've used the following events to test:&lt;/P&gt;&lt;PRE&gt;2023-11-12 00:00:00 id=1 name=a hello how where&lt;BR /&gt;2023-11-12 00:01:00 id=2 name=b hello how where&lt;BR /&gt;2023-11-12 00:03:00 id=1 name=a completed&lt;BR /&gt;2023-11-12 00:10:00 id=3 name=c hello how where&lt;BR /&gt;2023-11-12 00:10:00 id=4 name=d hello how where&lt;BR /&gt;2023-11-12 00:14:00 id=3 name=c completed&lt;BR /&gt;2023-11-12 00:16:00 id=4 name=d completed&lt;/PRE&gt;&lt;P&gt;Save the following as an alert, and schedule it to run every minute:&lt;/P&gt;&lt;PRE&gt;((index=index1 sourcetype=sourcetype1) OR (index=index2 sourcetype=sourcetype2)) earliest=-6m@m latest=@m&lt;BR /&gt;| addinfo&lt;BR /&gt;| where _time&amp;lt;relative_time(info_max_time, "-5m@m") OR match(_raw, "completed")&lt;BR /&gt;| transaction keepevicted=t id name startswith="hello AND how AND where" endswith="completed"&lt;BR /&gt;| where (closed_txn==0 AND NOT match(_raw, "completed")) OR duration&amp;gt;300&lt;BR /&gt;| table _time id name&lt;/PRE&gt;&lt;P&gt;You can test the search using hard-coded, 6-minute timespans instead of earliest=-6m@m latest=@m. There will be a &amp;gt;1 minute delay before alerts are triggered, but the 6-minute time range allows us to cover the start time +/- 30 seconds of a sliding 5-minute window.&lt;/P&gt;&lt;P&gt;Using the sample data, alerts would be triggered at the following times:&lt;/P&gt;&lt;P&gt;Execution time: ~2023-11-12 00:07:00 - no completed event&lt;BR /&gt;=&amp;gt;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%" height="25px"&gt;&lt;STRONG&gt;_time&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="33.333333333333336%" height="25px"&gt;&lt;STRONG&gt;id&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="33.333333333333336%" height="25px"&gt;&lt;STRONG&gt;name&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%" height="25px"&gt;&lt;SPAN&gt;2023-11-12 00:01:00&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD width="33.333333333333336%" height="25px"&gt;2&lt;/TD&gt;&lt;TD width="33.333333333333336%" height="25px"&gt;b&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Execution time: ~2023-11-12 00:16:00 - completed event late (&amp;gt;5 minutes)&lt;BR /&gt;=&amp;gt;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;&lt;STRONG&gt;_time&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;&lt;STRONG&gt;id&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;&lt;STRONG&gt;name&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;&lt;SPAN&gt;2023-11-12 00:10:00&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;4&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;d&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 13 Nov 2023 00:38:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668377#M15492</guid>
      <dc:creator>tscroggins</dc:creator>
      <dc:date>2023-11-13T00:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668381#M15493</link>
      <description>&lt;P&gt;Please help me on below things:&lt;/P&gt;&lt;P&gt;Requirements:&lt;/P&gt;&lt;P&gt;Once 3 events meets, immediately next event should published.if event is not published after 5 min ,need alert.&lt;/P&gt;&lt;P&gt;Example :&lt;/P&gt;&lt;P&gt;We have one customerno.for the customer number ,I have to search whether 3 events meets logs available in the splunk log or not&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ex: index= 1 source type ="abc" "s1 event received" and "s2 event received" and "s3 event received"&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I search above query ,I will be getting like&lt;/P&gt;&lt;P&gt;S1 received for 12345 customer&lt;/P&gt;&lt;P&gt;S2 received for 12345 customer&lt;/P&gt;&lt;P&gt;S3 received for 12345 customer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If for one customer,all 3 event are met,next i want to search "created" message available in the splunk for same customer (12345)&lt;/P&gt;&lt;P&gt;Here "created" message index and source type is different&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If "created" message not available for 12345 customer no after 5 min once all 3 events meets,I need alert.pls help on this query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 02:21:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668381#M15493</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-13T02:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668386#M15494</link>
      <description>&lt;P&gt;Please help me on below things:&lt;/P&gt;&lt;P&gt;Requirements:&lt;/P&gt;&lt;P&gt;Once 3 events meets, immediately next event should published.if event is not published after 5 min ,need alert.&lt;/P&gt;&lt;P&gt;Example :&lt;/P&gt;&lt;P&gt;We have one customerno.for the customer number ,I have to search whether 3 events meets logs available in the splunk log or not&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ex: index= 1 source type ="abc" "s1 event received" and "s2 event received" and "s3 event received"&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I search above query ,I will be getting like( format as below )&lt;/P&gt;&lt;P&gt;S1 received for 12345 customer,name=abz&lt;/P&gt;&lt;P&gt;S2 received for 12345 customer,name = abz&lt;/P&gt;&lt;P&gt;S3 received for 12345 customer,name =abz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If for one customer,all 3 event are met,next i want to search "created" message available in the splunk for same customer (12345)&lt;/P&gt;&lt;P&gt;Here "created" message index and source type is different&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If "created" message not available for 12345 customer no after 5 min once all 3 events meets,I need alert with customer no.pls help on this query..if "created" message available after 5 min also need capture customer number.&lt;/P&gt;&lt;P&gt;Fyi : if we received "created" message in the log ,sample log will be (json format )&lt;/P&gt;&lt;P&gt;Log : created :{"customer no" : "12345",name :"kanunam"} like that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please please help me on search query.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 03:17:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668386#M15494</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-13T03:17:01Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka stream alert</title>
      <link>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668426#M15495</link>
      <description>&lt;P&gt;Could you please replicate and share the search the query in splunk&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 14:00:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Kafka-stream-alert/m-p/668426#M15495</guid>
      <dc:creator>Pravinsugi</dc:creator>
      <dc:date>2023-11-13T14:00:20Z</dc:date>
    </item>
  </channel>
</rss>

