<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Add another condition Help in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448908#M168214</link>
    <description>&lt;P&gt;Hello, please help create a search add another condition to fire this alert if there are no results&lt;/P&gt;

&lt;P&gt;Here is the splunk output if there is  no result&lt;/P&gt;

&lt;P&gt;localhost.localdomain: timed out, nothing received&lt;/P&gt;

&lt;H1&gt;***Request timed out&lt;/H1&gt;

&lt;P&gt;index=timevariance | multikv | where isint(when) | rex field=remote "(?*\w*)" | eval abs_offset=abs(offset) | search abs_offset&amp;gt;=100000 | append [ search index=_* ERROR sourcetype=splunkd component=ExecProcessor NOT admon message="&lt;EM&gt;ntp&lt;/EM&gt;" | stats count values(message) as _raw by host ] | eval alert_contact=case(host LIKE "irprinfspl%", "Security", host LIKE "deprinfspl%", "Security", host LIKE "%", "SysEng") | eval alert_description="Time Out of Sync. Use NOC portal to sync up time &amp;amp; restart ntp service. Any other issues contact alert_contact." | table _time, host, alert_contact, alert_description, _raw | search host!=&lt;EM&gt;splnod&lt;/EM&gt; host!="&lt;EM&gt;pvtemplate&lt;/EM&gt;"&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 20:31:48 GMT</pubDate>
    <dc:creator>dave0970</dc:creator>
    <dc:date>2020-09-29T20:31:48Z</dc:date>
    <item>
      <title>Add another condition Help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448908#M168214</link>
      <description>&lt;P&gt;Hello, please help create a search add another condition to fire this alert if there are no results&lt;/P&gt;

&lt;P&gt;Here is the splunk output if there is  no result&lt;/P&gt;

&lt;P&gt;localhost.localdomain: timed out, nothing received&lt;/P&gt;

&lt;H1&gt;***Request timed out&lt;/H1&gt;

&lt;P&gt;index=timevariance | multikv | where isint(when) | rex field=remote "(?*\w*)" | eval abs_offset=abs(offset) | search abs_offset&amp;gt;=100000 | append [ search index=_* ERROR sourcetype=splunkd component=ExecProcessor NOT admon message="&lt;EM&gt;ntp&lt;/EM&gt;" | stats count values(message) as _raw by host ] | eval alert_contact=case(host LIKE "irprinfspl%", "Security", host LIKE "deprinfspl%", "Security", host LIKE "%", "SysEng") | eval alert_description="Time Out of Sync. Use NOC portal to sync up time &amp;amp; restart ntp service. Any other issues contact alert_contact." | table _time, host, alert_contact, alert_description, _raw | search host!=&lt;EM&gt;splnod&lt;/EM&gt; host!="&lt;EM&gt;pvtemplate&lt;/EM&gt;"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 20:31:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448908#M168214</guid>
      <dc:creator>dave0970</dc:creator>
      <dc:date>2020-09-29T20:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: Add another condition Help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448909#M168215</link>
      <description>&lt;P&gt;@dave0970,&lt;/P&gt;

&lt;P&gt;Are you looking for something similar?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=timevariance | multikv | where isint(when) | rex field=remote "(?*\w)" | eval abs_offset=abs(offset) | search abs_offset&amp;gt;=100000 | append [ search index=_* ERROR sourcetype=splunkd component=ExecProcessor NOT admon message="ntp" | stats count values(message) as _raw by host ] | eval alert_contact=case(host LIKE "irprinfspl%", "Security", host LIKE "deprinfspl%", "Security", host LIKE "%", "SysEng") | eval alert_description="Time Out of Sync. Use NOC portal to sync up time &amp;amp; restart ntp service. Any other issues contact alert_contact." | table _time, host, alert_contact, alert_description, _raw | search (host!=splnod  AND 
 host!="pvtemplate") OR ("nothing received")
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 20 Jul 2018 13:09:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448909#M168215</guid>
      <dc:creator>renjith_nair</dc:creator>
      <dc:date>2018-07-20T13:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: Add another condition Help</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448910#M168216</link>
      <description>&lt;P&gt;Hi Renjith,&lt;/P&gt;

&lt;P&gt;Thank you! I will test it out. Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jul 2018 13:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Add-another-condition-Help/m-p/448910#M168216</guid>
      <dc:creator>dave0970</dc:creator>
      <dc:date>2018-07-20T13:29:48Z</dc:date>
    </item>
  </channel>
</rss>

