<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to alert when a field value has &amp;gt; 500 events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/646999#M223949</link>
    <description>&lt;P&gt;Would this do&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|stats count by user, eventType
| where eventType == "Blocked" AND count &amp;gt; 500&lt;/LI-CODE&gt;&lt;P&gt;(Note your code sample says eventType while the text description says EventType.)&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jun 2023 15:39:03 GMT</pubDate>
    <dc:creator>yuanliu</dc:creator>
    <dc:date>2023-06-14T15:39:03Z</dc:date>
    <item>
      <title>How to alert when a field value has &gt; 500 events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/646997#M223948</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm not sure how to achieve this.&amp;nbsp; I need to create an alert for when a field (user) value has &amp;gt; 500 events for when another field (eventType) is filtered on a specific value.&lt;/P&gt;
&lt;P&gt;i.e.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;User: John&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;EventType: Blocked&lt;/P&gt;
&lt;P&gt;I can't figure it out.&amp;nbsp; Here's what I have so far:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;|stats count by user, eventType&lt;BR /&gt;|eventstats sum(count) as count by eventType&lt;BR /&gt;|stats values(eventType) as Blocked, values(user) as user&lt;BR /&gt;|table user, Blocked&lt;BR /&gt;|where count&amp;gt;500&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for any help on this,&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 18:02:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/646997#M223948</guid>
      <dc:creator>mninansplunk</dc:creator>
      <dc:date>2023-06-15T18:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to alert when a field value has &gt; 500 events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/646999#M223949</link>
      <description>&lt;P&gt;Would this do&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|stats count by user, eventType
| where eventType == "Blocked" AND count &amp;gt; 500&lt;/LI-CODE&gt;&lt;P&gt;(Note your code sample says eventType while the text description says EventType.)&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 15:39:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/646999#M223949</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-06-14T15:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to alert when a field value has &gt; 500 events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/647170#M224004</link>
      <description>&lt;P&gt;Perfect, that did the trick, thank you for the help.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 13:16:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-field-value-has-gt-500-events/m-p/647170#M224004</guid>
      <dc:creator>mninansplunk</dc:creator>
      <dc:date>2023-06-15T13:16:26Z</dc:date>
    </item>
  </channel>
</rss>

