<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to trigger an custom alert condition of multiples from the basic search of Splunk? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642257#M222480</link>
    <description>&lt;P&gt;Changing "and" to "AND" is simply a syntactic fix since the logical operator must be uppercase so lowercase "and" would search for the string "and" in your results.&lt;/P&gt;&lt;P&gt;Anyway, your requirement seems a bit vague so it would be best if you shared (anonymized if needed) sample of output of your scheduled search and explained when you would like the alert triggered.&lt;/P&gt;</description>
    <pubDate>Thu, 04 May 2023 09:51:44 GMT</pubDate>
    <dc:creator>PickleRick</dc:creator>
    <dc:date>2023-05-04T09:51:44Z</dc:date>
    <item>
      <title>How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642148#M222443</link>
      <description>&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;SPAN&gt;I am new to Splunk and facing an issue while setting up the custom alert. The results as shown in Table 1.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="0.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/25201i81CD8E8FB3D660E0/image-size/large?v=v2&amp;amp;px=999" role="button" title="0.png" alt="0.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;SPAN&gt;I have tried the one which is highlighted in red color below is not working.&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="0.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/25199i47D339CBB0B3DA50/image-size/large?v=v2&amp;amp;px=999" role="button" title="0.png" alt="0.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;P&gt;How do I configure for both of the values ie., DCOEtransfercount and NDMCopycount?&lt;/P&gt;&lt;P&gt;Note: Ignore the DCOEtransfercount and NDMCopycount labels in both of the tables.&lt;/P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 03 May 2023 16:05:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642148#M222443</guid>
      <dc:creator>AjayTakur</dc:creator>
      <dc:date>2023-05-03T16:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642160#M222447</link>
      <description>&lt;P&gt;I've had the best results by putting the trigger criteria in the search and then have the alert trigger when the number of results is not zero.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;&amp;lt;your search&amp;gt;&amp;gt;
| where (DCOEtransfercount=1 AND NDNCopycount=1)&lt;/LI-CODE&gt;&lt;P&gt;It's also possible your current settings would work by changing "and" to "AND" in the trigger condition.&lt;/P&gt;</description>
      <pubDate>Wed, 03 May 2023 16:53:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642160#M222447</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-05-03T16:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642240#M222473</link>
      <description>&lt;P&gt;&lt;SPAN&gt;By changing "and" to "AND" in the trigger condition does not work. since I assume the table has multiple rows each for&amp;nbsp;&lt;/SPAN&gt;DCOEtransfercount &amp;amp; NDNCopycount. hence it is not working. how do those two conditions together make it work with different rows?&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 08:02:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642240#M222473</guid>
      <dc:creator>AjayTakur</dc:creator>
      <dc:date>2023-05-04T08:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642257#M222480</link>
      <description>&lt;P&gt;Changing "and" to "AND" is simply a syntactic fix since the logical operator must be uppercase so lowercase "and" would search for the string "and" in your results.&lt;/P&gt;&lt;P&gt;Anyway, your requirement seems a bit vague so it would be best if you shared (anonymized if needed) sample of output of your scheduled search and explained when you would like the alert triggered.&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 09:51:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642257#M222480</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-05-04T09:51:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642259#M222481</link>
      <description>&lt;P&gt;By putting the trigger criteria in the search&lt;BR /&gt;&amp;lt;&amp;lt;your search&amp;gt;&amp;gt;&lt;BR /&gt;| where (DCOEtransfercount=1 AND NDNCopycount=1)&lt;BR /&gt;is also getting events irrespective of whether the value is 1/2/3 for both the DCOEtransfercount AND NDNCopycount. It seems that the where a condition is not working.&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 09:58:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642259#M222481</guid>
      <dc:creator>AjayTakur</dc:creator>
      <dc:date>2023-05-04T09:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642275#M222485</link>
      <description>&lt;P&gt;The trigger condition is&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;DCOEtransfercount=1 AND NDNCopycount=1&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;Search query is&lt;/P&gt;&lt;PRE&gt;...
| append [search index="pd" "successful" "notif/output/"
  | stats count as DtransferCount by _raw 
  | fields DtransferCount 
  | rename _raw as Dtransfer] 
| append [search index="pd" "SBID=nr" "DM" "PAM=sende" "notif/archive/" 
  | stats count as DMCopyCount by _raw 
  | fields DMCopyCount
  | rename _raw as DMCopy]&lt;/PRE&gt;&lt;P&gt;Results are:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="11.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/25227i3CFF9CB6D57B048E/image-size/large?v=v2&amp;amp;px=999" role="button" title="11.png" alt="11.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 11:01:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642275#M222485</guid>
      <dc:creator>AjayTakur</dc:creator>
      <dc:date>2023-05-04T11:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642280#M222489</link>
      <description>&lt;P&gt;OK. So your options are:&lt;/P&gt;&lt;P&gt;1. Rework your search so that the results are aggregated into single event so that you can compare different fields within a single event or&lt;/P&gt;&lt;P&gt;2. Use something like |stats values in your condition search to "compress" the results and then compare aggregated fields.&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 11:12:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642280#M222489</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-05-04T11:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642285#M222491</link>
      <description>&lt;P&gt;Could you provide me with the query using option 2..&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 11:30:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642285#M222491</guid>
      <dc:creator>AjayTakur</dc:creator>
      <dc:date>2023-05-04T11:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger an custom alert condition of multiples from the basic search of Splunk?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642286#M222492</link>
      <description>&lt;P&gt;Something like&lt;/P&gt;&lt;PRE&gt;stats&amp;nbsp; values(*) as * | where DCOEtransfercount=1 AND NDNCopycount=1&lt;/PRE&gt;&lt;P&gt;as the alert condition.&lt;/P&gt;&lt;P&gt;Might need further tweaking if you expect multiple result rows in your original results.&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 11:57:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-an-custom-alert-condition-of-multiples-from-the/m-p/642286#M222492</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-05-04T11:57:01Z</dc:date>
    </item>
  </channel>
</rss>

