<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert when a field value changes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700157#M237624</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;I ended up taking an entirely different approach. I ditched inputlookup/lookup and used a bit of eval, where and eventstats to achieve it. For your suggestion to use summary index, I do not have privileges to create a new index, so couldn't try that but it would have worked i guess. Thank you though,&amp;nbsp; I can definitely keep this approach in mind whenever I run into problems again.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2024 03:51:35 GMT</pubDate>
    <dc:creator>arjun_ananth</dc:creator>
    <dc:date>2024-09-26T03:51:35Z</dc:date>
    <item>
      <title>Alert when a field value changes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700046#M237583</link>
      <description>&lt;P&gt;Working on a query to generate an alert when a field value changes. The requirement is to detect the change in IP for a FQDN.&lt;/P&gt;&lt;P&gt;Currently I'm trying to use a lookup file which has the current value of the IP for two FQDN per host.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Columns - Host|FQDN|Current_IP&lt;/P&gt;&lt;P&gt;Looks something like&lt;/P&gt;&lt;P&gt;Host1 fqdn1 IP1&lt;/P&gt;&lt;P&gt;Host2 fqdn1 IP1&lt;/P&gt;&lt;P&gt;Host1 fqdn2 IP2&lt;/P&gt;&lt;P&gt;Host2 fqdn2 IP2&lt;/P&gt;&lt;P&gt;I followed an approach suggested in another thread to use inputlookup&lt;/P&gt;&lt;P&gt;My current query looks like - stats latest(IP) as Latest_IP | inputlookup append=true myfile.csv | stats first(Latest_IP) as Latest_IP, first(Current_IP) as Previous_IP | where Latest_IP!=Previous_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This gives me a result with the latest and previous IP whenever the IP changes, but looking to add more details to the result which also lists the FQDN and the time when the IP changed.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 05:46:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700046#M237583</guid>
      <dc:creator>arjun_ananth</dc:creator>
      <dc:date>2024-09-25T05:46:13Z</dc:date>
    </item>
    <item>
      <title>Re: Alert when a field value changes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700047#M237584</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/272516"&gt;@arjun_ananth&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I don't like lookup method, I'd like to use a summary index:&lt;/P&gt;&lt;P&gt;schedule a search every night (if the change frequency that you want to monitor is one day) e.g.:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=your_index
| dedup ip
| table _time host ip
| collect index=your_summary&lt;/LI-CODE&gt;&lt;P&gt;and then run a search on the summary index:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=your_summary
| stats dc(ip) AS ip_count By host
| where ip_count&amp;gt;1&lt;/LI-CODE&gt;&lt;P&gt;in this way you haven't the problem of manage the timestamp and lookup upgrade, and, at the same time, you have a quick search.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 06:21:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700047#M237584</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-09-25T06:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: Alert when a field value changes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700068#M237589</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;. I will try this and let you know.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are right about the lookup. Whenever the IP values changes, the lookup file also needs to be updated. I managed to get the output using the lookup earlier, but then I tried to update the lookup file in the same query which messed up the column names, and the query won't work anymore since the values changed. I will try the summary method and let you know. Thanks again&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 08:38:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700068#M237589</guid>
      <dc:creator>arjun_ananth</dc:creator>
      <dc:date>2024-09-25T08:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Alert when a field value changes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700091#M237590</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/272516"&gt;@arjun_ananth&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;let me know if we can help you more, or, please, accept one answer for the other people of Community.&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 12:45:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700091#M237590</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-09-25T12:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Alert when a field value changes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700157#M237624</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;I ended up taking an entirely different approach. I ditched inputlookup/lookup and used a bit of eval, where and eventstats to achieve it. For your suggestion to use summary index, I do not have privileges to create a new index, so couldn't try that but it would have worked i guess. Thank you though,&amp;nbsp; I can definitely keep this approach in mind whenever I run into problems again.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 03:51:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-when-a-field-value-changes/m-p/700157#M237624</guid>
      <dc:creator>arjun_ananth</dc:creator>
      <dc:date>2024-09-26T03:51:35Z</dc:date>
    </item>
  </channel>
</rss>

