<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create an email alert when the error count on a server is more than 10 occurrences in a 15 minute interval? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268602#M4928</link>
    <description>&lt;P&gt;Have your search look back 15 minutes  and in spot labeled "Trigger alert when", use the "Custom" action and add :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;search count&amp;gt;10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If, on the other hand, you want to look back 24 hours and get a count for every 15 minutes, try&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search | bin _time span=15m | stats count BY _time Machine | search count&amp;gt;10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In addition, there's no need to &lt;CODE&gt;dedup Machine&lt;/CODE&gt; when you use &lt;CODE&gt;stats count BY Machine&lt;/CODE&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Oct 2016 21:49:41 GMT</pubDate>
    <dc:creator>Yorokobi</dc:creator>
    <dc:date>2016-10-21T21:49:41Z</dc:date>
    <item>
      <title>How to create an email alert when the error count on a server is more than 10 occurrences in a 15 minute interval?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268601#M4927</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I have this simple search to find out some errors in the logs:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=cohl source=msmq  earliest=-24h@h latest=now  "System.Data.SqlClient.SqlException: Timeout expired*" "Servername*" | xmlkv | dedup Machine | stats count by Machine
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;As a result of this search, I get a table which has one row listing of all the servers and another row listing the count, this count is the number of occurrences of the keyword.&lt;/P&gt;

&lt;P&gt;I need to create an alert to send email if, in 15 minutes, the count on any of the servers is more than 10. Any idea on how to do it??&lt;/P&gt;</description>
      <pubDate>Fri, 21 Oct 2016 21:13:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268601#M4927</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2016-10-21T21:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an email alert when the error count on a server is more than 10 occurrences in a 15 minute interval?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268602#M4928</link>
      <description>&lt;P&gt;Have your search look back 15 minutes  and in spot labeled "Trigger alert when", use the "Custom" action and add :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;search count&amp;gt;10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If, on the other hand, you want to look back 24 hours and get a count for every 15 minutes, try&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;your base search | bin _time span=15m | stats count BY _time Machine | search count&amp;gt;10
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In addition, there's no need to &lt;CODE&gt;dedup Machine&lt;/CODE&gt; when you use &lt;CODE&gt;stats count BY Machine&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Oct 2016 21:49:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268602#M4928</guid>
      <dc:creator>Yorokobi</dc:creator>
      <dc:date>2016-10-21T21:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an email alert when the error count on a server is more than 10 occurrences in a 15 minute interval?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268603#M4929</link>
      <description>&lt;P&gt;I can do that, but my requirement is little bit different.&lt;/P&gt;

&lt;P&gt;As I mentioned in my question, each server will have certain number of events and the result of my query will give the list of servers, I want to send an alert when on any of the server the number of occurrences of events is more than 10.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 14:59:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268603#M4929</guid>
      <dc:creator>macadminrohit</dc:creator>
      <dc:date>2016-10-24T14:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an email alert when the error count on a server is more than 10 occurrences in a 15 minute interval?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268604#M4930</link>
      <description>&lt;P&gt;If that's the case, then the first part of my answer is what you want.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Oct 2016 15:34:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-create-an-email-alert-when-the-error-count-on-a-server-is/m-p/268604#M4930</guid>
      <dc:creator>Yorokobi</dc:creator>
      <dc:date>2016-10-24T15:34:10Z</dc:date>
    </item>
  </channel>
</rss>

