<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk Alert Create alert based on count over past time frame in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Alert-Create-alert-based-on-count-over-past-time-frame/m-p/527103#M148781</link>
    <description>&lt;P&gt;Hi Splunk Community&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need some assistance with a Splunk alert, the search result provides exactly what I require but the alert can be improved.&lt;/P&gt;&lt;P&gt;The search query:&amp;nbsp;&lt;BR /&gt;source="/var/log/wireless.log" AnyConnect OR NetworkDeviceName=fw* "NOTICE Passed-Authentication: Authentication succeeded" earliest=-30d@d latest=now&lt;BR /&gt;| iplocation Calling_Station_ID&lt;BR /&gt;| where NOT Country="South Africa"&lt;BR /&gt;| stats count by Country, User_Name&lt;BR /&gt;| eventstats sum(count) as Country_Count by Country&lt;BR /&gt;| eventstats sum(count) as Username_Count by User_Name&lt;BR /&gt;| where NOT (Username_Count &amp;gt;= 10 AND Country_Count &amp;gt;= 10)&lt;/P&gt;&lt;P&gt;The search returns users and country,&amp;nbsp; only if the username count is less 10 and the country count is less than 10 in past 30 days, which is exactly what I want. The problem comes in wit h the alert, if I schedule the alert (lets say 10min) the query gets run, it creates alerts for each return value. I only want new events to be returned and not values which =was alerted on 10min ago.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way one can achieve this ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Oct 2020 14:19:53 GMT</pubDate>
    <dc:creator>Pmeiring</dc:creator>
    <dc:date>2020-10-29T14:19:53Z</dc:date>
    <item>
      <title>Splunk Alert Create alert based on count over past time frame</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Alert-Create-alert-based-on-count-over-past-time-frame/m-p/527103#M148781</link>
      <description>&lt;P&gt;Hi Splunk Community&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need some assistance with a Splunk alert, the search result provides exactly what I require but the alert can be improved.&lt;/P&gt;&lt;P&gt;The search query:&amp;nbsp;&lt;BR /&gt;source="/var/log/wireless.log" AnyConnect OR NetworkDeviceName=fw* "NOTICE Passed-Authentication: Authentication succeeded" earliest=-30d@d latest=now&lt;BR /&gt;| iplocation Calling_Station_ID&lt;BR /&gt;| where NOT Country="South Africa"&lt;BR /&gt;| stats count by Country, User_Name&lt;BR /&gt;| eventstats sum(count) as Country_Count by Country&lt;BR /&gt;| eventstats sum(count) as Username_Count by User_Name&lt;BR /&gt;| where NOT (Username_Count &amp;gt;= 10 AND Country_Count &amp;gt;= 10)&lt;/P&gt;&lt;P&gt;The search returns users and country,&amp;nbsp; only if the username count is less 10 and the country count is less than 10 in past 30 days, which is exactly what I want. The problem comes in wit h the alert, if I schedule the alert (lets say 10min) the query gets run, it creates alerts for each return value. I only want new events to be returned and not values which =was alerted on 10min ago.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any way one can achieve this ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you so much&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 14:19:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Alert-Create-alert-based-on-count-over-past-time-frame/m-p/527103#M148781</guid>
      <dc:creator>Pmeiring</dc:creator>
      <dc:date>2020-10-29T14:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Alert Create alert based on count over past time frame</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-Alert-Create-alert-based-on-count-over-past-time-frame/m-p/527114#M148784</link>
      <description>&lt;P&gt;Throttle the alert on the User_Name and Country fields.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2020 15:18:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-Alert-Create-alert-based-on-count-over-past-time-frame/m-p/527114#M148784</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-10-29T15:18:52Z</dc:date>
    </item>
  </channel>
</rss>

