<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need Help Designing Total Outage Alerts in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543653#M153997</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/39865"&gt;@hollybross1219&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can get the missing partner_idds without using join, please try with below sample;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Search_A
| eval partner_idd=colaesce(field1, field2)
| eval partner_active=1
| inputlookup append=t Provider_alert.csv
| stats max(partner_active) as partner_active by partner_idd
| where isnull(partner_active)&lt;/LI-CODE&gt;</description>
    <pubDate>Sat, 13 Mar 2021 16:00:09 GMT</pubDate>
    <dc:creator>scelikok</dc:creator>
    <dc:date>2021-03-13T16:00:09Z</dc:date>
    <item>
      <title>Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543611#M153984</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;I'm having a really hard time creating an alert based of a search that detects the absence of events.&lt;/P&gt;&lt;P&gt;I have a list of total customers we monitor contained in a .csv in Splunk called&amp;nbsp;Provider_Alert.csv&lt;/P&gt;&lt;P&gt;My goal is to create (in SQL terms) a "left" join where my "left" table is all the Providers from Provider_Alert.csv and the second joined table is based off of Splunk logged events (let's call this Search_A), where if there was no match the absence of events would be 0.&lt;/P&gt;&lt;P&gt;An additional challenge I'm having is that the mutual field that join&amp;nbsp;Provider_Alert.csv and Search_A is one I have to derive with eval and coalesce statements (let's call this&amp;nbsp;partner_idd)...since it's split in two fields in Search_A.&lt;/P&gt;&lt;P&gt;So TL;DR:&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd like to join:&lt;/P&gt;&lt;P&gt;All entries in&amp;nbsp;Provider_Alert.csv&lt;/P&gt;&lt;P&gt;JOIN WHATEVER EVENTS ARE AVAILABLE FROM&lt;/P&gt;&lt;P&gt;Search_A |&amp;nbsp;eval partner_idd =coalesce(field1, field2) | JOIN ON partner_idd&lt;/P&gt;&lt;P&gt;And if there are no results from the JOIN, then it's 0.&lt;/P&gt;&lt;P&gt;Also happy to take recommendations, I've spent a whole afternoon on this so I'm desperate and open for any recommendations.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 01:05:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543611#M153984</guid>
      <dc:creator>hollybross1219</dc:creator>
      <dc:date>2021-03-13T01:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543644#M153993</link>
      <description>&lt;P&gt;Finding something that is not there is not Splunk's strong suit.&amp;nbsp; See this blog entry for a good write-up on it.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.duanewaddle.com/proving-a-negative/" target="_blank"&gt;https://www.duanewaddle.com/proving-a-negative/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 13:10:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543644#M153993</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-03-13T13:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543653#M153997</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/39865"&gt;@hollybross1219&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You can get the missing partner_idds without using join, please try with below sample;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Search_A
| eval partner_idd=colaesce(field1, field2)
| eval partner_active=1
| inputlookup append=t Provider_alert.csv
| stats max(partner_active) as partner_active by partner_idd
| where isnull(partner_active)&lt;/LI-CODE&gt;</description>
      <pubDate>Sat, 13 Mar 2021 16:00:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543653#M153997</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-03-13T16:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543658#M153998</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;, thanks for passing along. I followed the high level concept of the blog, but I'm stuck on my use case which is much more complex.&lt;/P&gt;&lt;P&gt;My file (&lt;SPAN&gt;Provider_Alert.csv) has several columns. So everything appended is blank and I'm not sure how to "join" the mutual fields together.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Based on the article, so far I have this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-60px"&gt;splunk_server=indexer* index=wsi sourcetype=fdpwsiperf intuit_offeringid IN ("Intuit.tax.ice.ice", "Intuit.platform.turbotaxwindows","Intuit.tax.ctg.ice.109ximportwidget","Intuit.platform.turbotaxipad.turbotaxmac") api_version=*&lt;BR /&gt;| eval offering=if(in(intuit_offeringid,"Intuit.tax.ice.ice","Intuit.tax.ctg.ice.109ximportwidget"),"TTO","TTD")&lt;BR /&gt;| eval partner_idd=coalesce(partnerId, legacy_id)&lt;BR /&gt;| eval form_type=if(like(capability,"109%"), "109X",'capability')&lt;BR /&gt;| eval partner_name=coalesce(partnerId, partner_uid)&lt;BR /&gt;| search partner_name!=*test*&lt;BR /&gt;| eval combo='partner_idd'+"::"+'form_type'+"::"+'partner_name'+"::"+'api_version'&lt;BR /&gt;| chart dc(intuit_tid) as import_activity OVER combo BY offering&lt;BR /&gt;| eval partner_idd=mvindex(split(combo,"::"),0)&lt;BR /&gt;| eval api_version=mvindex(split(combo,"::"),3)&lt;BR /&gt;| fields partner_idd *&lt;BR /&gt;| inputlookup append=true Provider_Alert.csv&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The resulting table is this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="blank_fields.JPG" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/13300iA06E566062CE32F8/image-size/large?v=v2&amp;amp;px=999" role="button" title="blank_fields.JPG" alt="blank_fields.JPG" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is there a way&amp;nbsp; to associate partner_idd with the field called Provider_ID from&amp;nbsp;Provider_Alert.csv before appending so that there's data filled in for mutual matches?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 16:21:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543658#M153998</guid>
      <dc:creator>hollybross1219</dc:creator>
      <dc:date>2021-03-13T16:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543668#M154000</link>
      <description>&lt;P&gt;To associate two fields, rename one of them to match the other then use the stats command to regroup the results by that field.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wsi sourcetype=fdpwsiperf intuit_offeringid IN ("Intuit.tax.ice.ice", "Intuit.platform.turbotaxwindows","Intuit.tax.ctg.ice.109ximportwidget","Intuit.platform.turbotaxipad.turbotaxmac") api_version=*
| eval offering=if(in(intuit_offeringid,"Intuit.tax.ice.ice","Intuit.tax.ctg.ice.109ximportwidget"),"TTO","TTD")
| eval partner_idd=coalesce(partnerId, legacy_id)
| eval form_type=if(like(capability,"109%"), "109X",'capability')
| eval partner_name=coalesce(partnerId, partner_uid)
| search partner_name!=*test*
| eval combo='partner_idd'+"::"+'form_type'+"::"+'partner_name'+"::"+'api_version'
| chart dc(intuit_tid) as import_activity OVER combo BY offering
| eval partner_idd=mvindex(split(combo,"::"),0)
| eval api_version=mvindex(split(combo,"::"),3)
| fields partner_idd *
| inputlookup append=true Provider_Alert.csv
| rename partner_idd as Provider_ID
| stats values(*) as * by Provider_ID&lt;/LI-CODE&gt;</description>
      <pubDate>Sat, 13 Mar 2021 18:19:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543668#M154000</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-03-13T18:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543750#M154031</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp; -- so this solves the join problem between mutual values in Provider_Alert.csv and my data from Search_A, however, I still can't detect outage situations &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Values from&amp;nbsp;Provider_Alert.csv that are not in&amp;nbsp;Search_A are gone.&lt;/P&gt;&lt;P&gt;For example, I know we had a service outage at a very specific time...so I'm looking for that Provider_ID (676) from&amp;nbsp;Provider_Alert.csv present in my stats results with 0.&lt;/P&gt;&lt;P&gt;The query below with your suggestions doesn't yield any results &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;index=wsi sourcetype=fdpwsiperf intuit_offeringid IN ("Intuit.tax.ice.ice", "Intuit.platform.turbotaxwindows","Intuit.tax.ctg.ice.109ximportwidget","Intuit.platform.turbotaxipad.turbotaxmac") api_version=* tier=Tier1&lt;BR /&gt;| eval offering=if(in(intuit_offeringid,"Intuit.tax.ice.ice","Intuit.tax.ctg.ice.109ximportwidget"),"TTO","TTD")&lt;BR /&gt;| eval partner_idd=coalesce(partnerId, legacy_id)&lt;BR /&gt;| eval form_type=if(like(capability,"109%"), "109X",'capability')&lt;BR /&gt;| eval partner_name=coalesce(partnerId, partner_uid)&lt;BR /&gt;| search partner_name!=*test*&lt;BR /&gt;| eval combo='partner_idd'+"::"+'form_type'+"::"+'partner_name'+"::"+'api_version'&lt;BR /&gt;| chart dc(intuit_tid) as import_activity OVER combo BY offering&lt;BR /&gt;| eval partner_idd=mvindex(split(combo,"::"),0)&lt;BR /&gt;| eval api_version=mvindex(split(combo,"::"),3)&lt;BR /&gt;| fields partner_idd *&lt;BR /&gt;| inputlookup append=true Provider_Alert.csv&lt;BR /&gt;| rename partner_idd as Provider_ID&lt;BR /&gt;| stats values(*) as * by Provider_ID api_version&lt;BR /&gt;| where Provider_ID=676&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 21:48:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543750#M154031</guid>
      <dc:creator>hollybross1219</dc:creator>
      <dc:date>2021-03-14T21:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543751#M154032</link>
      <description>&lt;P&gt;Tinkered around a little...&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; | rename partner_idd as Provider_ID&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This achieves renaming&amp;nbsp;partner_idd based on splunk events and wiping away&amp;nbsp;Provider_ID from&amp;nbsp;Provider_Alert.csv&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; | rename Provider_ID as partner_idd&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Wiped away&amp;nbsp;partner_idd from actual splunk events and renamed data in&amp;nbsp;Provider_Alert.csv&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 21:55:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543751#M154032</guid>
      <dc:creator>hollybross1219</dc:creator>
      <dc:date>2021-03-14T21:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Designing Total Outage Alerts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543753#M154033</link>
      <description>&lt;P&gt;Figured it out...&lt;/P&gt;&lt;P&gt;| inputlookup append=true Provider_Alert.csv where Tier=Tier1 Active="TRUE"&lt;BR /&gt;| join type=outer&lt;BR /&gt;[ search index=wsi sourcetype=fdpwsiperf intuit_offeringid IN ("Intuit.tax.ice.ice", "Intuit.platform.turbotaxwindows","Intuit.tax.ctg.ice.109ximportwidget","Intuit.platform.turbotaxipad.turbotaxmac") api_version=* tier=Tier1&lt;BR /&gt;| eval offering=if(in(intuit_offeringid,"Intuit.tax.ice.ice","Intuit.tax.ctg.ice.109ximportwidget"),"TTO","TTD")&lt;BR /&gt;| eval Provider_ID=coalesce(partnerId, legacy_id)&lt;BR /&gt;| search Provider_ID!=*test*&lt;BR /&gt;| chart dc(intuit_tid) as import_activity OVER Provider_ID BY offering&lt;BR /&gt;| fields Provider_ID *]&lt;BR /&gt;| fillnull&lt;/P&gt;</description>
      <pubDate>Sun, 14 Mar 2021 22:29:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Need-Help-Designing-Total-Outage-Alerts/m-p/543753#M154033</guid>
      <dc:creator>hollybross1219</dc:creator>
      <dc:date>2021-03-14T22:29:23Z</dc:date>
    </item>
  </channel>
</rss>

