<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Create an alert email from a splunk search result in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523026#M9776</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope things are well.&lt;/P&gt;&lt;P&gt;Progress report:&lt;BR /&gt;&lt;BR /&gt;I have the trigger percent threshold low (30%), so I may receive the alert to see what results are rendered.&amp;nbsp; As of now, I like what I am seeing as progress is being made, but I think fine tuning is still needed. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alert_30percent.jpg" style="width: 794px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11125iD1C99E5ECA480998/image-size/large?v=v2&amp;amp;px=999" role="button" title="Alert_30percent.jpg" alt="Alert_30percent.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I received an email alert below with the following info, please see image below. &amp;nbsp;&lt;SPAN&gt;I was drawn to the "count" column with the figures being so low for a 3 minute window (if understanding the syntax correctly).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Email Alert_30percent.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11126i1D00D607342C6963/image-size/large?v=v2&amp;amp;px=999" role="button" title="Email Alert_30percent.jpg" alt="Email Alert_30percent.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;For comparison, I did a manual "top value" check using the time frame of 10/5/2020 11:25am to 11:28am as the email trigger seen from the above image is that of 11:28:09. Please see image below and one can notice the count difference between the two different images:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="countdiff.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11127i455A4FD81AC55D92/image-size/large?v=v2&amp;amp;px=999" role="button" title="countdiff.jpg" alt="countdiff.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there away to mitigate the difference in the count reporting?&amp;nbsp; &lt;SPAN&gt;If so, how?&lt;/SPAN&gt;&amp;nbsp; I would expect the count mount per each reason to be higher during a 3 minute window.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your time, help and response is appreciated.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Oct 2020 16:05:29 GMT</pubDate>
    <dc:creator>ToKnowMore</dc:creator>
    <dc:date>2020-10-05T16:05:29Z</dc:date>
    <item>
      <title>Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522825#M9768</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to create an alert based email on the following manually entered search string below.&amp;nbsp; The time frame used was for a 3 minute period, say from 1:02am to 1:05am, 10/2/2020.&amp;nbsp; As one can see from the result only has 3 reasons are present and that is fine as I know more would be reported if there were other reasons to be reported.&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;STRONG&gt;index=firewall host=10.10.10.10 | top limit=20 reason&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Below is an example of the output:&lt;/P&gt;&lt;P class="lia-indent-padding-left-60px"&gt;&lt;STRONG&gt;reason&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; count&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; percentage&lt;/STRONG&gt;&lt;BR /&gt;Idle Timeout&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 582&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 88.7197512&lt;BR /&gt;Transport Closing&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 42&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;6.402439&lt;BR /&gt;DPD Failure&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;32&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;4.878049&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It is my desire to have this alert be generated any time a reason is equal to or greater than 7&lt;/SPAN&gt;&lt;SPAN&gt;0% for a 3 minute period.&amp;nbsp; The trigger would be &lt;/SPAN&gt;&lt;STRONG&gt;any reason&lt;/STRONG&gt;&lt;SPAN&gt; passing that threshold percentage of 70%.&amp;nbsp; I understand this is considered "rolling window triggering" as such the following document was referred to me:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;docs.splunk.com/Documentation/SplunkCloud/latest/Alert/DefineRealTimeAlerts#Create_a_real-time_alert_with_rolling_window_triggering&lt;/P&gt;&lt;P&gt;That said, I did not find those instructions to be helpful for a percentage threshold trigger alert.&amp;nbsp; Perhaps what I am hoping to do cannot be done.&amp;nbsp; Nonetheless, I thought I would inquire with the Splunk community.&lt;/P&gt;&lt;P&gt;FYI, we are on code 7.3.5 and have no idea when an upgrade is taking place and to what code version.&lt;/P&gt;&lt;P&gt;Your time, help, patience and feedback is appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Oct 2020 00:27:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522825#M9768</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-04T00:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522836#M9769</link>
      <description>&lt;P&gt;Set your alert to run every minute; depending on how quickly your logs are indexed, set your earliest and latest to cover a 3 minute period relative to when the query is run e.g. earliest="-5m@m" latest="-2m@m"; trigger you alert on percentage &amp;gt;= 70 (might need to be &amp;gt;=0.7 depending on the actual data). Alternative ways to trigger the alert are to put a where clause in to find only reasons where the percentage is &amp;gt;= 70% and then trigger for any result.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Oct 2020 09:08:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522836#M9769</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-04T09:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522858#M9770</link>
      <description>&lt;P&gt;Hello ITWhisperer,&lt;/P&gt;&lt;P&gt;Thank you much for taking the time to respond, its much appreciated.&amp;nbsp; &lt;SPAN&gt;Sorry ITWhisperer, I did not know how to appropriately incorporate your suggestions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Below is how I got the result mentioned in my original post, please see screenshots. It was a different tool that was used to see (graphically) a precipitous drop in activity.&amp;nbsp; This drop took place during a 1 minute window, so a splunk search was used with a 1min before and after the reported event, hence 3 minutes window.&lt;/P&gt;&lt;P&gt;So I am trying to see if we can receive an email alert with similar info provided in image #3 for any given time for any given reason.&amp;nbsp; I feel like this is doable as I get the result I am looking for by using the steps seen in images 1 thru 3 manually.&amp;nbsp; How can I automate this using a floating 3 minute window?&lt;/P&gt;&lt;P&gt;Is it best to do a real time or a schedule (cron job) alert with a delay in running the result as mentioned out of indexing concerns?&amp;nbsp; I am open to suggestions. &amp;nbsp; FYI, image #4 is my feeble attempt to create a "real time alert".&amp;nbsp;&lt;/P&gt;&lt;P&gt;What steps may I follow get the desired results that I get from image #3 for a floating time period where any reason passes a 70% threshold?&lt;/P&gt;&lt;P&gt;Again, thanks for your time, feedback and help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1_SearchString.jpg" style="width: 620px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11107i19CD0C50836D5E65/image-size/large?v=v2&amp;amp;px=999" role="button" title="1_SearchString.jpg" alt="1_SearchString.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2_TopValues.jpg" style="width: 602px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11106iFC851EB66F922FAF/image-size/large?v=v2&amp;amp;px=999" role="button" title="2_TopValues.jpg" alt="2_TopValues.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3_Results.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11108i5D5A73474340BE1B/image-size/large?v=v2&amp;amp;px=999" role="button" title="3_Results.jpg" alt="3_Results.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below &lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="4_CreateAlert.jpg" style="width: 800px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11109iDF95CF6D3C55FC0E/image-size/large?v=v2&amp;amp;px=999" role="button" title="4_CreateAlert.jpg" alt="4_CreateAlert.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Oct 2020 14:44:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522858#M9770</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-04T14:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522864#M9771</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227112"&gt;@ToKnowMore&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Realtime alerts are expensive, so a scheduled alert might be better. You could run it every minute&amp;nbsp; (still expensive) and look back over the last 3 minutes. Your custom trigger needs to be a search of the results, and your field looks like it is called percent not percentage&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 928px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11110iC28C162CEFD4F6B2/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Yes, the delay is out of concerns about indexing. If your indexing is fast enough, you can perhaps have a short delay (as above where the latest time is the beginning of the current minute). If you want to give the indexers more chance to have indexed the data then change earliest to say "-5m@m" and latest to "-2m@m" (and change the timerange to last 5 minutes.&lt;/P&gt;</description>
      <pubDate>Sun, 04 Oct 2020 15:30:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522864#M9771</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-04T15:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522880#M9772</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this message finds you well.&lt;/P&gt;&lt;P&gt;Sorry have had to shuttle from one place to another today.&amp;nbsp; Finally got home.&lt;/P&gt;&lt;P&gt;Thanks very much for your response.&amp;nbsp; I found the provided image to be helpful!&lt;/P&gt;&lt;P&gt;I have implemented your suggestions and Splunk didn't bark at me (I suspect as you anticipated).&amp;nbsp; Will see once the event takes place early tomorrow morning and the desired associated email alert is sent.&lt;/P&gt;&lt;P&gt;Will advise accordingly!&lt;/P&gt;&lt;P&gt;Thanks again for your time, knowledge and patience.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 00:37:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522880#M9772</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-05T00:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522884#M9773</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Progress!&amp;nbsp; Thanks very much.&lt;/P&gt;&lt;P&gt;I am getting alerts.&amp;nbsp; More than I anticipated.&amp;nbsp; It seems that the email is generated once the total percentage sum is more than 75%.&lt;/P&gt;&lt;P&gt;How may I get the email to generate when the TOP reason is more than 75%?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BTW, I changed from "percent&amp;gt;=.07" as the emails were coming in droves.&amp;nbsp; Once I changed the trigger to "percent&amp;gt;=75%" the emails were less frequent, but I do not see the &lt;STRONG&gt;top&lt;/STRONG&gt; reason hitting 75%.&lt;/P&gt;&lt;P&gt;Please see images below.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Edit Alert.jpg" style="width: 799px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11111iF9C6E100B4F57FA7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Edit Alert.jpg" alt="Edit Alert.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Email alert.jpg" style="width: 686px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11112i592981AF50C3D481/image-size/large?v=v2&amp;amp;px=999" role="button" title="Email alert.jpg" alt="Email alert.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Your help is appreciated.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 01:37:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522884#M9773</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-05T01:37:08Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522933#M9774</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227112"&gt;@ToKnowMore&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure but you could try changing the latest to "-2m@m" so you are only looking at one minute between 3 minutes and 2 minutes ago. This just in case there is more indexing happening which is giving you different results when you look at the data.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another option is to break the results up into 1 minute chunks before doing the top so that you find when a reason occurs more than 75% of t&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=firewall host=10.10.10.10 earliest="-3m@m" latest="@m" | bin span=1m _time | stats count by _time, reason | top limit=20 reason&lt;/LI-CODE&gt;&lt;P&gt;he time within any minute (which is possibly more what you are after?).&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 09:10:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522933#M9774</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-05T09:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522974#M9775</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have implemented your suggestion and will advise.&lt;/P&gt;&lt;P&gt;Thanks for your assistance thus far as progress has definitely been made!&lt;/P&gt;&lt;P&gt;Again will advise, so some time may go by before I provide an update.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 12:10:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/522974#M9775</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-05T12:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523026#M9776</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope things are well.&lt;/P&gt;&lt;P&gt;Progress report:&lt;BR /&gt;&lt;BR /&gt;I have the trigger percent threshold low (30%), so I may receive the alert to see what results are rendered.&amp;nbsp; As of now, I like what I am seeing as progress is being made, but I think fine tuning is still needed. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alert_30percent.jpg" style="width: 794px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11125iD1C99E5ECA480998/image-size/large?v=v2&amp;amp;px=999" role="button" title="Alert_30percent.jpg" alt="Alert_30percent.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I received an email alert below with the following info, please see image below. &amp;nbsp;&lt;SPAN&gt;I was drawn to the "count" column with the figures being so low for a 3 minute window (if understanding the syntax correctly).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Email Alert_30percent.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11126i1D00D607342C6963/image-size/large?v=v2&amp;amp;px=999" role="button" title="Email Alert_30percent.jpg" alt="Email Alert_30percent.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;For comparison, I did a manual "top value" check using the time frame of 10/5/2020 11:25am to 11:28am as the email trigger seen from the above image is that of 11:28:09. Please see image below and one can notice the count difference between the two different images:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="countdiff.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11127i455A4FD81AC55D92/image-size/large?v=v2&amp;amp;px=999" role="button" title="countdiff.jpg" alt="countdiff.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there away to mitigate the difference in the count reporting?&amp;nbsp; &lt;SPAN&gt;If so, how?&lt;/SPAN&gt;&amp;nbsp; I would expect the count mount per each reason to be higher during a 3 minute window.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your time, help and response is appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 16:05:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523026#M9776</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-05T16:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523043#M9777</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227112"&gt;@ToKnowMore&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This does look like there is a delay in the indexing. As I suggested, try changing the latest to "-2m@m" to give the indexers a couple of minutes to get a more substantial count. Or perhaps even earliest "-6m@m" and latest "-3m@m". You probably need to try a few values to see what works best for you.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 17:57:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523043#M9777</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-05T17:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523227#M9780</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry ITWhisperer, for whatever reason I did not get an email alert that you responded otherwise I would have replied to you immediately.&lt;/P&gt;&lt;P&gt;As of this entry, I have implemented your latest suggestion and will advise results pending some time.&lt;/P&gt;&lt;P&gt;Thanks again for your continued assistance!&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 15:34:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523227#M9780</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-06T15:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523280#M9781</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi ITWhisperer,&lt;/P&gt;&lt;P&gt;I implemented your suggestions and then made a few adjustments, currently have the following syntax:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT&gt;index=firewall host=10.10.10.10 earliest="-75m@m" latest="-2m@m" | bin span=2m _time | stats count by _time, reason | top limit=20 reason&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;Purposely have the trigger threshold set low - 20%&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AlertSetup_screenshot.jpg" style="width: 784px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11146iA6A7381AA8C71BCC/image-size/large?v=v2&amp;amp;px=999" role="button" title="AlertSetup_screenshot.jpg" alt="AlertSetup_screenshot.jpg" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The email generated from the string above is seen below.&amp;nbsp; The count under the count column did increase, but I am bewildered that there is no disparity between the reason codes as seen for count and percentage and/or percentage.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Ealiesttime_75.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11142i52F8140F300DAE87/image-size/large?v=v2&amp;amp;px=999" role="button" title="Ealiesttime_75.jpg" alt="Ealiesttime_75.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Another example:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Another_emailalert_10062020.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11147iEA151279258A9A2B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Another_emailalert_10062020.jpg" alt="Another_emailalert_10062020.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;When doing a manual check of top reasons, there is a discernable difference between count/percentage amongst the reason codes.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SettingTimeNdate.jpg" style="width: 652px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11144i83B8FBE233BD2395/image-size/large?v=v2&amp;amp;px=999" role="button" title="SettingTimeNdate.jpg" alt="SettingTimeNdate.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Manual_check.jpg" style="width: 945px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11145i9449A4A1B34E0DC3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Manual_check.jpg" alt="Manual_check.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Is there some additional info that I may provide that could aid in this effort?&amp;nbsp; I saw a job inspector:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Job Inspector.jpg" style="width: 934px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11148iBC6B33B632030272/image-size/large?v=v2&amp;amp;px=999" role="button" title="Job Inspector.jpg" alt="Job Inspector.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Would it be worthwhile pulling info from the "search job properties" of the manual search seen above and leverage it for what I am trying to do?&amp;nbsp; Below is a screen shot of the "request" portion of the "search job properties"&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="job_inspector_request.jpg" style="width: 616px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11149iF65451EBE0F2BDFA/image-size/large?v=v2&amp;amp;px=999" role="button" title="job_inspector_request.jpg" alt="job_inspector_request.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&amp;nbsp; Is a snickers bar needed?&lt;/P&gt;&lt;P&gt;Your help, time and patience is appreciated!&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 19:40:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523280#M9781</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-06T19:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523289#M9782</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227112"&gt;@ToKnowMore&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think I mislead you with my previous suggestion - I looks like top is counting the occurrences of reason in the bins rather than in the original data. Try this instead:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=firewall host=10.10.10.10 earliest="-76m@m" latest="-2m@m" 
| bin span=2m _time 
| stats count by _time, reason 
| eventstats sum(count) as total by _time
| eval percent=count * 100 / total
| sort - percent
| head 20&lt;/LI-CODE&gt;&lt;P&gt;I changed the earliest so that earliest - latest is a multiple of the span&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 20:25:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523289#M9782</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-06T20:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523305#M9783</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;No worries at all.&amp;nbsp; I've made progress working with you and am appreciative.&lt;/P&gt;&lt;P&gt;I made the adjustment you suggested but tweaked the enlarged number seen below:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT&gt;index=firewall host=10.10.10.10 earliest="-&lt;FONT size="5"&gt;6&lt;/FONT&gt;m@m" latest="-3m@m" | bin span=2m _time | stats count by _time, reason | eventstats sum(count) as total by _time | eval percent=count * 100 / total | sort - percent | head 20&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="updated string.jpg" style="width: 761px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11153i29BC4A51142B9E31/image-size/large?v=v2&amp;amp;px=999" role="button" title="updated string.jpg" alt="updated string.jpg" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;The reason for the change was the following example email alert below, I found the results going back too far in time:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="76min_alert.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11154iF68B36C7AD6D04A0/image-size/large?v=v2&amp;amp;px=999" role="button" title="76min_alert.jpg" alt="76min_alert.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;WIth the adjustment mentioned above, I then received an alert with the following result, please note the alert trigger time versus time results reported.&amp;nbsp; I think it looks better.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="6earliest_3late.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11156iC565DF85D39F5F5D/image-size/large?v=v2&amp;amp;px=999" role="button" title="6earliest_3late.jpg" alt="6earliest_3late.jpg" /&gt;&lt;/span&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;I upped the trigger percent threshold to 75% so that I do not get frequent emails as I have been with the setting at 20%.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry, from the image directly above, how is the &lt;STRONG&gt;total&lt;/STRONG&gt; getting calculated?&amp;nbsp; Also what refinements if any do you recommend?&lt;BR /&gt;&lt;BR /&gt;Also, is it unrealistic of me to do a manual 3 minutes window check at any given time to compare the automated email alert received if and when one gets generated?&lt;/P&gt;&lt;P&gt;Does that make sense?&lt;/P&gt;&lt;P&gt;Thanks for HELP thus far!&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 21:50:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523305#M9783</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-06T21:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523310#M9784</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update.&lt;/P&gt;&lt;P&gt;Though I increased the trigger threshold to 75%, I am receiving an alert about every minute, similar to the one below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FrequentEmailalert.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11157i8792CB246CBB3B55/image-size/large?v=v2&amp;amp;px=999" role="button" title="FrequentEmailalert.jpg" alt="FrequentEmailalert.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also, it the time range of 3 minutes seen in the alert configuration somewhat in conflict of what's in the search field?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TimeRange.jpg" style="width: 739px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11158iC245899123A5A905/image-size/large?v=v2&amp;amp;px=999" role="button" title="TimeRange.jpg" alt="TimeRange.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry for the tremendous amount of questions in the communique and my last post to you.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 22:20:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523310#M9784</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-06T22:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523311#M9785</link>
      <description>&lt;P&gt;Setting earliest to &lt;A href="mailto:-6m@m" target="_blank"&gt;-6m@m&lt;/A&gt;&amp;nbsp;and latest to &lt;A href="mailto:-3m@m" target="_blank"&gt;-3m@m&lt;/A&gt;&amp;nbsp;and span 2m means you will get 2 buckets, one from -6m to -4m and one from -4m to -3m that is one bucket for 2 minutes and another for 1 minute. So you could use &lt;A href="mailto:-7m@m" target="_blank"&gt;-7m@m&lt;/A&gt;&amp;nbsp;and &lt;A href="mailto:-3m@m" target="_blank"&gt;-3m@m&lt;/A&gt;.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=firewall host=10.10.10.10 earliest="-7m@m" latest="-3m@m" 
| bin span=2m _time 
/* Count the number of times each reason occurs in each of the two 2 minute time slots */
| stats count by _time, reason 
/* Add all the counts in the same time slot to get the total number of events in each time slot */
| eventstats sum(count) as total by _time
/* Calculate the percentage of total events in each time slot each count represents */  
| eval percent=count * 100 / total
/* Find the top reasons by percentage across all time slots */ 
| sort - percent | head 20&lt;/LI-CODE&gt;&lt;P&gt;If you want to see what each part does, just add them line by line and look at the results.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 22:34:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523311#M9785</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-06T22:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523314#M9786</link>
      <description>&lt;P&gt;Time range should at least cover the period of the query i.e. at least as far back as the earliest in the query so should be last 7 minutes.&lt;/P&gt;&lt;P&gt;The cron expression is set to run every minute. If you want it to run every 2 minutes, the first * should be */2. Given that the query covers a total of 4 minute (-7 to -3), you could set the first * to */4&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 22:41:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523314#M9786</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-06T22:41:22Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523331#M9787</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your responses!&lt;/P&gt;&lt;P&gt;Made requested adjustments.&amp;nbsp; I am getting email alerts, however, the highest percent figure is under the trigger threshold of 75%, please see trigger setting (blue arrow).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alert_threshold75.jpg" style="width: 734px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11160i681314F63BB180AC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Alert_threshold75.jpg" alt="Alert_threshold75.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Should the trigger be &lt;STRONG&gt;percent &amp;gt;= 75&lt;/STRONG&gt;&amp;nbsp; ?&lt;/P&gt;&lt;P&gt;Below is an example of an email alert received with the trigger being &lt;STRONG&gt;percent&amp;gt;=75%&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Email alert 75_but no 75.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11162iFD9885737C29016C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Email alert 75_but no 75.jpg" alt="Email alert 75_but no 75.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your time and input is appreciated.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 02:45:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523331#M9787</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-07T02:45:27Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523354#M9789</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/227112"&gt;@ToKnowMore&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes,&amp;nbsp;&lt;SPAN&gt;the trigger should be&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;percent &amp;gt;= 75&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 06:31:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523354#M9789</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2020-10-07T06:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Create an alert email from a splunk search result</title>
      <link>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523416#M9793</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yuppers, changed the percent trigger as directed.&lt;/P&gt;&lt;P&gt;I received email alerts where the 75 percent threshold was met or surpassed.&amp;nbsp; I was surprised how many I received over night.&lt;/P&gt;&lt;P&gt;To mitigate the early AM email alerts in particular,&amp;nbsp; may I include a "where count &amp;gt; 100"?&amp;nbsp; This would be in addition to the trigger alert of "search percent&amp;gt;=80"?&lt;/P&gt;&lt;P&gt;I ask this because reviewing the emails received in the early AM hours revealed that ANY reason count did not meet or exceed 100.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to single out the &lt;STRONG&gt;top reason&lt;/STRONG&gt; to have at least a hit count of 100?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Splunk_countmore100question.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11175i499E4279E3F804B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Splunk_countmore100question.jpg" alt="Splunk_countmore100question.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I modified the search string with the following to see what results would render in addition to lowering ther percent trigger threshold to 20 to see what email alert values would be generated.&amp;nbsp; At present, I have not received any email alert, so I clearly did not use the "where count &amp;gt; 20" command properly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;index=firewall host=156.33.226.83 earliest="-7m@m" latest="-3m@m" | bin span=2m _time | stats count by _time, reason | eventstats sum(count) as total by _time | eval percent=count * 100 / total | sort - percent | &lt;EM&gt;&lt;FONT size="4"&gt;where count &amp;gt; 20&lt;/FONT&gt;&lt;/EM&gt;&amp;nbsp;| head 20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AlertConfig.jpg" style="width: 727px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11177i5488C7C5E1BF9CB3/image-size/large?v=v2&amp;amp;px=999" role="button" title="AlertConfig.jpg" alt="AlertConfig.jpg" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The introduction of "where count &amp;gt; 20" broke the alert, and I say this because no alert has since been generated.&amp;nbsp; I performed a manual 3 minute window check of top reasons, please see below.&amp;nbsp; There are counts above 20 and percent above 20, so was hoping an alert would be generated, but that did not happen.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Manual Top Reason check.jpg" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/11178iDC84BF35B3021FFE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Manual Top Reason check.jpg" alt="Manual Top Reason check.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;How can the TOP reason count be taken into consideration in that only take action if that TOP reason account is above 100 (arbitrary number) while maintaining the trigger threshold of 80?&lt;/P&gt;&lt;P&gt;What adjustment is need in the search string?&lt;/P&gt;&lt;P&gt;There is light at the end of the tunnel!&lt;/P&gt;&lt;P&gt;Thanks for your help!!&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 12:35:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-an-alert-email-from-a-splunk-search-result/m-p/523416#M9793</guid>
      <dc:creator>ToKnowMore</dc:creator>
      <dc:date>2020-10-07T12:35:35Z</dc:date>
    </item>
  </channel>
</rss>

