<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert on any value in any column which exceeds a threshold? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308342#M162770</link>
    <description>&lt;P&gt;Thank you for the suggestion. It will leave only values that are higher than the threshold. However it keeps all the columns with all IPs that are not higher as well, with null values.  Could you please suggest how I would be able to remove all the null values?  (so I would be left only with table : 2:00am |  101  )&lt;/P&gt;

&lt;P&gt;I have tried to use CASE  with one expression instead of IF command, however my idea does not have the wanted effect as it also displays all columns including the null ones. &lt;/P&gt;</description>
    <pubDate>Mon, 26 Feb 2018 14:17:40 GMT</pubDate>
    <dc:creator>chalak</dc:creator>
    <dc:date>2018-02-26T14:17:40Z</dc:date>
    <item>
      <title>Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308340#M162768</link>
      <description>&lt;P&gt;I have list of IPs and a number of requests summarized in statistics tab with a following query:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| datamodel X Y search
    | timechart  span=1h count(request) as num by ip usenull=f useother=f limit=0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;the output is in the following format :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Time   |    192.168.0.1 | 192.168.0.2  | 192.168.0.3 | ...
1:00   |       20       |     30       |     50      | ...
2:00   |       30       |     50       |    101      | ...
3:00   |       10       |     25       |     30      | ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I would like to alert if any value in the entire table exceeds a given threshold? (eg. threshold &amp;gt; 100). How can I achieve this?&lt;/P&gt;

&lt;P&gt;I have tried several ways, inlcuding: | search num &amp;gt; 100; however, that is not working. &lt;/P&gt;

&lt;P&gt;Could you please help me out here.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 12:53:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308340#M162768</guid>
      <dc:creator>chalak</dc:creator>
      <dc:date>2018-02-22T12:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308341#M162769</link>
      <description>&lt;P&gt;I suggest the &lt;CODE&gt;foreach&lt;/CODE&gt; command, since this is a dynamic table. &lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/7.0.2/SearchReference/Foreach"&gt;http://docs.splunk.com/Documentation/Splunk/7.0.2/SearchReference/Foreach&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;It will be something like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| datamodel X Y search
| timechart  span=1h count(request) as num by ip usenull=f useother=f limit=0
| foreach *.* [|eval &amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;=if('&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;'&amp;gt;100,'&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;',null())]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;a little fine tuning might need to be made depending on the end goal of the query.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2018 14:03:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308341#M162769</guid>
      <dc:creator>cmerriman</dc:creator>
      <dc:date>2018-02-22T14:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308342#M162770</link>
      <description>&lt;P&gt;Thank you for the suggestion. It will leave only values that are higher than the threshold. However it keeps all the columns with all IPs that are not higher as well, with null values.  Could you please suggest how I would be able to remove all the null values?  (so I would be left only with table : 2:00am |  101  )&lt;/P&gt;

&lt;P&gt;I have tried to use CASE  with one expression instead of IF command, however my idea does not have the wanted effect as it also displays all columns including the null ones. &lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 14:17:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308342#M162770</guid>
      <dc:creator>chalak</dc:creator>
      <dc:date>2018-02-26T14:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308343#M162771</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;| datamodel X Y search
 | timechart  span=1h count(request) as num by ip usenull=f useother=f limit=0
 | foreach *.* [|eval &amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;=if('&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;'&amp;gt;100,'&amp;lt;&amp;lt;FIELD&amp;gt;&amp;gt;',null())]
 |transpose header_field=time|stats max(*) as *
 |transpose header_field=column column_name=time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;you could try the above. it's going to have an ip in the column name, but that's not necessarily the ip that hit the thresholds. and i'm just grabbing the max threshold hit at each hour. &lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 14:49:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308343#M162771</guid>
      <dc:creator>cmerriman</dc:creator>
      <dc:date>2018-02-26T14:49:33Z</dc:date>
    </item>
    <item>
      <title>Re: Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308344#M162772</link>
      <description>&lt;P&gt;I see your point, however I am trying to achieve a table with the information: IPs (which exceeded the threshold) + number of requests. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Time   |  192.168.0.3 | ...
 2:00   |       101      | ...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Would you be able to help me to achieve this kind of output?&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 15:18:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308344#M162772</guid>
      <dc:creator>chalak</dc:creator>
      <dc:date>2018-02-26T15:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308345#M162773</link>
      <description>&lt;P&gt;Try like this. You can set your alert to fire when number of result from below search is greater than 0.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| datamodel X Y search
| bucket span=1h _time 
| stats  count(request) as num by _time ip 
| where num&amp;gt;100
| timechart span=1h values(num) by ip
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 26 Feb 2018 17:29:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308345#M162773</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2018-02-26T17:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: Alert on any value in any column which exceeds a threshold?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308346#M162774</link>
      <description>&lt;P&gt;Exactly what i was looking for. Thank you. &lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2018 10:27:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-on-any-value-in-any-column-which-exceeds-a-threshold/m-p/308346#M162774</guid>
      <dc:creator>chalak</dc:creator>
      <dc:date>2018-02-28T10:27:17Z</dc:date>
    </item>
  </channel>
</rss>

