<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert with 3 different threshold for 3 different  event in on alert in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685652#M15964</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/247215"&gt;@cbiraris&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I suppose that these three values are in a field (e.g. type), so you can run a search like the folowing:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index= abc sourcetype=xyz type IN ("warning", "Error", Critical)
| stats
    values(eval(type="warning")) AS warning_count
    values(eval(type="Error")) AS Error_count
    values(eval(type="Critical")) AS Critical_count
| where warning_count&amp;gt;5 OR Error_count&amp;gt;5 OR Critical_count&amp;gt;5&lt;/LI-CODE&gt;&lt;P&gt;you can aso setup a different threshold for each type of message.&lt;/P&gt;&lt;P&gt;If you don't have the three values in a fied, you have to use a similar search:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index= abc sourcetype=xyz ("warning" OR "Error" OR Critical)
| stats
    values(eval(searchmatch("warning"))) AS warning_count
    values(eval(searchmatch("Error"))) AS Error_count
    values(eval(searchmatch("Critical"))) AS Critical_count
| where warning_count&amp;gt;5 OR Error_count&amp;gt;5 OR Critical_count&amp;gt;5&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2024 16:18:56 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-04-26T16:18:56Z</dc:date>
    <item>
      <title>Alert with 3 different threshold for 3 different  event in on alert</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685646#M15960</link>
      <description>&lt;P&gt;Hi team,&lt;BR /&gt;&lt;BR /&gt;I need help to create a query with&amp;nbsp;with 3 different threshold for 3 different event in single splunk alert.&lt;BR /&gt;&lt;BR /&gt;for example :&lt;BR /&gt;&lt;BR /&gt;index= abc&lt;BR /&gt;sourcetype=xyz&lt;BR /&gt;&lt;BR /&gt;"warning" OR "Error" OR Critical&lt;BR /&gt;&lt;BR /&gt;If any of these ("warning" OR "Error" OR Critical) occurred 5 times in events in last 15 minutes alert should be triggered .&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 15:58:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685646#M15960</guid>
      <dc:creator>cbiraris</dc:creator>
      <dc:date>2024-04-26T15:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: Alert with 3 different threshold for 3 different  event in on alert</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685647#M15961</link>
      <description>&lt;P&gt;Please clarify your requirement - do you want the alert to trigger if any of the values occurs 5 times e.g. 2 warnings, 2 errors and 1 critical, or only if any of them individually occur 5 times e.g. 5 warnings or 5 errors or 5 criticals?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 16:02:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685647#M15961</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-04-26T16:02:15Z</dc:date>
    </item>
    <item>
      <title>Re: Alert with 3 different threshold for 3 different  event in on alert</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685650#M15962</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yes, only if any of them individually occur 5 times e.g. 5 warnings or 5 errors or 5 criticals&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 16:16:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685650#M15962</guid>
      <dc:creator>cbiraris</dc:creator>
      <dc:date>2024-04-26T16:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: Alert with 3 different threshold for 3 different  event in on alert</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685651#M15963</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Yes, only if any of them individually occur 5 times e.g. 5 warnings or 5 errors or 5 criticals&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 16:17:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685651#M15963</guid>
      <dc:creator>cbiraris</dc:creator>
      <dc:date>2024-04-26T16:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Alert with 3 different threshold for 3 different  event in on alert</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685652#M15964</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/247215"&gt;@cbiraris&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I suppose that these three values are in a field (e.g. type), so you can run a search like the folowing:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index= abc sourcetype=xyz type IN ("warning", "Error", Critical)
| stats
    values(eval(type="warning")) AS warning_count
    values(eval(type="Error")) AS Error_count
    values(eval(type="Critical")) AS Critical_count
| where warning_count&amp;gt;5 OR Error_count&amp;gt;5 OR Critical_count&amp;gt;5&lt;/LI-CODE&gt;&lt;P&gt;you can aso setup a different threshold for each type of message.&lt;/P&gt;&lt;P&gt;If you don't have the three values in a fied, you have to use a similar search:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index= abc sourcetype=xyz ("warning" OR "Error" OR Critical)
| stats
    values(eval(searchmatch("warning"))) AS warning_count
    values(eval(searchmatch("Error"))) AS Error_count
    values(eval(searchmatch("Critical"))) AS Critical_count
| where warning_count&amp;gt;5 OR Error_count&amp;gt;5 OR Critical_count&amp;gt;5&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 16:18:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685652#M15964</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-04-26T16:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: Alert with 3 different threshold for 3 different  event in on alert</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685654#M15965</link>
      <description>&lt;P&gt;Thank you this one working for me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 16:25:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-with-3-different-threshold-for-3-different-event-in-on/m-p/685654#M15965</guid>
      <dc:creator>cbiraris</dc:creator>
      <dc:date>2024-04-26T16:25:56Z</dc:date>
    </item>
  </channel>
</rss>

