<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SysLog based Alert in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58627#M14362</link>
    <description>&lt;P&gt;that worked out well. I guess I could have also tried using separate evals and then lump them together&lt;/P&gt;

&lt;P&gt;yours looks much more profesional .. thank you&lt;/P&gt;</description>
    <pubDate>Thu, 13 Sep 2012 16:39:00 GMT</pubDate>
    <dc:creator>asarolkar</dc:creator>
    <dc:date>2012-09-13T16:39:00Z</dc:date>
    <item>
      <title>SysLog based Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58625#M14360</link>
      <description>&lt;P&gt;I am trying to set up an Alert for syslog (udp:514) - and this is the search condition I use:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="syslog" TCP_DST_PORT="31621" | eval timeStamp=date_year."-".date_month."-".date_mday.":".date_hour.":".date_minute.":".date_second | table timeStamp, count(eval(TCP_TYPE="TCP_Client_Accepted")) as F5_ACCEPT, count(eval(TCP_TYPE="TCP_Node_Connected")) as F5_CONNECT | eval F5_MISSED=F5_ACCEPT-F5_CONNECT  | WHERE F5_MISSED&amp;gt;2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Note that syslog is the log in Splunk that captures transmitted messages on udp:514&lt;/P&gt;

&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;
Note also that date _ year, date _ month, date _ mday, date _ hour, date _ minute, date _ second are all populated&lt;/P&gt;

&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;
&lt;BR /&gt;&lt;/P&gt;

&lt;P&gt;This is what I expect in the CSV alert that in the email.&lt;/P&gt;

&lt;P&gt;|| YYYY-MM-DD:HH:MM:SS || F5_ ACCEPT || F5_CONNECT || F5_ MISSED ||&lt;/P&gt;

&lt;P&gt;But that search does not currently work. Any suggestions ?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 12:25:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58625#M14360</guid>
      <dc:creator>asarolkar</dc:creator>
      <dc:date>2020-09-28T12:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: SysLog based Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58626#M14361</link>
      <description>&lt;P&gt;Don't think you can use table like that.&lt;/P&gt;

&lt;P&gt;What you're trying to do is get statistics for your F5s connect rate per second&lt;BR /&gt;&lt;BR /&gt;
The field _time is easier to manipulate than all the date parts - you can format the _time field later.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype="syslog" TCP_DST_PORT="31621" 
| bin _time span=1s
| stats count(eval(TCP_TYPE=="TCP_Client_Accepted")) as F5_ACCEPT, count(eval(TCP_TYPE=="TCP_Node_Connected")) as F5_CONNECT by _time 
| eval F5_MISSED=F5_ACCEPT-F5_CONNECT  
| WHERE F5_MISSED&amp;gt;2
| eval timestamp=strftime(_time),"%%Y-%m-%d:%H:%M:%S")
| table timestamp F5_ACCEPT F5_CONNECT F5_MISSED
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Does the above search show the results you need ?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2012 09:49:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58626#M14361</guid>
      <dc:creator>jonuwz</dc:creator>
      <dc:date>2012-09-13T09:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: SysLog based Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58627#M14362</link>
      <description>&lt;P&gt;that worked out well. I guess I could have also tried using separate evals and then lump them together&lt;/P&gt;

&lt;P&gt;yours looks much more profesional .. thank you&lt;/P&gt;</description>
      <pubDate>Thu, 13 Sep 2012 16:39:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SysLog-based-Alert/m-p/58627#M14362</guid>
      <dc:creator>asarolkar</dc:creator>
      <dc:date>2012-09-13T16:39:00Z</dc:date>
    </item>
  </channel>
</rss>

