<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121255#M184079</link>
    <description>&lt;P&gt;Got it now, you extracted the field as  (?&lt;TNSPING&gt;d+) &lt;/TNSPING&gt;&lt;/P&gt;

&lt;P&gt;tnsping and you are comparing with TNSping which doesnt even exist. Makes sure you always use the exact field name &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jan 2014 06:45:09 GMT</pubDate>
    <dc:creator>linu1988</dc:creator>
    <dc:date>2014-01-23T06:45:09Z</dc:date>
    <item>
      <title>Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121249#M184073</link>
      <description>&lt;P&gt;Hello-&lt;/P&gt;

&lt;P&gt;I have this log in Splunk:&lt;/P&gt;

&lt;P&gt;2014-01-22 17:18:11,509 INFO ben.benactiond: Event:'db1xxx-yyy.xxxx|LISTENER_db0100000-dr.xxxxx|/OEM/Alert|3|"OEM Event Listener response to a TNS ping is 450 msecs. Detail in OEM at //xxxx.xxxx:xxxxx/redirect?pageType=sdk-core-event-console-detailEvent&amp;amp;issueID=F071CFED50B45B79E043E403490A20CB"' Trigger:OEMAlert_Warning Action:email Status:SUCCESS &lt;/P&gt;

&lt;P&gt;Question: I want Splunk to send an email alert everytime the TNS Ping is greater than 5000msecs. What search strings should I use? Thank you in advance&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 15:41:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121249#M184073</guid>
      <dc:creator>Isaias_Garcia</dc:creator>
      <dc:date>2020-09-28T15:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121250#M184074</link>
      <description>&lt;P&gt;Try this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;yoursearchhere
| rex "TNS ping is (?&amp;lt;TNSping&amp;gt;\d+) msecs"
| where TNSping &amp;gt; 5000
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and set the alert to trigger if number of events is greater than zero.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jan 2014 11:42:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121250#M184074</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-01-22T11:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121251#M184075</link>
      <description>&lt;P&gt;Hi Iguinn-&lt;/P&gt;

&lt;P&gt;Thanks for your help.I tried your suggestion by doing this seach string:&lt;/P&gt;

&lt;P&gt;"OEM Event Listener response to a TNS ping is | rex "TNS ping is (?&lt;TNSPING&gt;\d+) msecs" | where TNSping &amp;gt; 5000"&lt;/TNSPING&gt;&lt;/P&gt;

&lt;P&gt;And I got this results:&lt;BR /&gt;
2014-01-23 09:04:07,401 INFO xxx.xxx: Event:'xxxx|LISTENER_xxxxx|/xxx/xxx3|"OEM Event Listener response to a TNS ping is 540 msecs..... &lt;/P&gt;

&lt;P&gt;2014-01-23 08:09:04,866 INFO zxxx.xxx: Event:'xxxx|LISTENER_xxxxx|/xxx/xxx3|"OEM Event Listener response to a TNS ping is 740 msecs. ....&lt;/P&gt;

&lt;P&gt;2014-01-23 02:13:42,328 INFO xxx.xxx: Event:'xxxx|LISTENER_xxxxx|/xxx/xxx3|"OEM Event Listener response to a TNS ping is 530 msecs.....&lt;/P&gt;

&lt;P&gt;It seems working, however, what I am getting is a TNS ping that is greater than 500 and not 5000. Perhaps it just needs some tweaking on the search. Please advise.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2014 01:21:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121251#M184075</guid>
      <dc:creator>Isaias_Garcia</dc:creator>
      <dc:date>2014-01-23T01:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121252#M184076</link>
      <description>&lt;P&gt;Huh. That's odd. But maybe we should make sure that TNSping is a number, like this&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;yoursearchhere&lt;BR /&gt;
| rex "TNS ping is (?&amp;lt;TNSping&amp;gt;\d+) msecs"&lt;BR /&gt;
| convert num(TNSping) as TNSping&lt;BR /&gt;
| where TNSping &amp;gt; 5000&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2014 05:52:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121252#M184076</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-01-23T05:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121253#M184077</link>
      <description>&lt;P&gt;Hi Iguinn -&lt;/P&gt;

&lt;P&gt;Thank you.I appreciate your help..However, I'm still getting the same  &amp;gt; 500 results instead of &amp;gt; 5000 after trying your suggestions:(&lt;BR /&gt;
Please advise&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2014 06:19:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121253#M184077</guid>
      <dc:creator>Isaias_Garcia</dc:creator>
      <dc:date>2014-01-23T06:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121254#M184078</link>
      <description>&lt;P&gt;Let's test by running this search:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;yoursearchhere&lt;BR /&gt;
| rex "TNS ping is (?&amp;lt;TNSping&amp;gt;\d+) msecs"&lt;BR /&gt;
| convert num(TNSping) as TNSping&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;After the search runs, see if you can find the TNSping field in the sidebar on the left. (You may have to run the search in "verbose" mode.)&lt;/P&gt;

&lt;P&gt;Click on the field name in the sidebar and add TNSping to the "selected fields." Now the TNSping value should show up beneath each event, along with the host, source and sourcetype. Does the value of TNSping make sense?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2014 06:35:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121254#M184078</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-01-23T06:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121255#M184079</link>
      <description>&lt;P&gt;Got it now, you extracted the field as  (?&lt;TNSPING&gt;d+) &lt;/TNSPING&gt;&lt;/P&gt;

&lt;P&gt;tnsping and you are comparing with TNSping which doesnt even exist. Makes sure you always use the exact field name &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2014 06:45:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121255#M184079</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2014-01-23T06:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121256#M184080</link>
      <description>&lt;P&gt;@linu1988 - good eye - that is the problem with the search that @Isaias.Garcia is running!&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2014 08:00:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121256#M184080</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-01-30T08:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121257#M184081</link>
      <description>&lt;P&gt;Hi Iguinn/linu&lt;/P&gt;

&lt;P&gt;Thanks for your responses..Im still getting "greater than 500" value instead of "5000" after fixing all the search strings. &lt;/P&gt;

&lt;P&gt;This is the search string I used per your suggestions:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;OEM Event Listener response to a TNS ping is | rex "TNS ping is (?\d+) msecs" | convert num(TNSping) as TNSping | where TNSping &amp;gt; "5,000"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;However the results are still "greater than 500"&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2014-02-03 09:26:18,913 INFO zen.zenactiond: Event:'xxxxx-xxxxx.xxxxx|LISTENERxxxxx-xxxxx.xxxxx|/OEM/Alert|3|"OEM Event Listener response to a TNS ping is 650 msecs. 2014-02-03 09:26:18,794 INFO zen.zenactiond: Event:'xxxxx-xxxxx.xxxxx|LISTENERxxxxx-xxxxx.xxxxx|/OEM/Alert|3|"OEM Event Listener response to a TNS ping is 650 msecs.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Please advise. I really appreciate your help on this,. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2014 01:50:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121257#M184081</guid>
      <dc:creator>Isaias_Garcia</dc:creator>
      <dc:date>2014-02-03T01:50:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121258#M184082</link>
      <description>&lt;P&gt;where did the &lt;TNSPING&gt; field go?&lt;/TNSPING&gt;&lt;/P&gt;

&lt;P&gt;| rex "TNS ping is (?&lt;TNSPING&gt;\d+) msecs"&lt;/TNSPING&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2014 17:34:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121258#M184082</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2014-02-03T17:34:39Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk search string  to send an email alert when the TNS Ping is greater than 5000msecs</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121259#M184083</link>
      <description>&lt;P&gt;As @linu1988 said - what happened to the field? Also, TNSping is not a string and you can't do &lt;CODE&gt;&amp;gt;&lt;/CODE&gt; for strings anyway, so your &lt;CODE&gt;where&lt;/CODE&gt; command will not work. Try this, carefully:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;OEM Event Listener response to a TNS ping is &lt;BR /&gt;
| rex "TNS ping is (?&amp;lt;TNSping&amp;gt;\d+) msecs" &lt;BR /&gt;
|  where TNSping &amp;gt; 5000&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2014 23:54:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Splunk-search-string-to-send-an-email-alert-when-the-TNS-Ping-is/m-p/121259#M184083</guid>
      <dc:creator>lguinn2</dc:creator>
      <dc:date>2014-02-11T23:54:27Z</dc:date>
    </item>
  </channel>
</rss>

