<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: i am looking for a particular string match in a log file. whenever it sees the String it should alert me with an email. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209159#M61103</link>
    <description>&lt;P&gt;You can use particular event code or event description in search string, whenever if any violation happens or particular string match in a log file you will get an alert &lt;/P&gt;

&lt;P&gt;Example:  if account is locked out we will get an alert  immediately by creating the alert by using below query,&lt;/P&gt;

&lt;P&gt;index=winsec EventCodeDescription="A user account was locked out" OR E ventCode = 4740|dedup user| stats count by user _time host&lt;/P&gt;

&lt;P&gt;Example for Crontab schedule: &lt;/P&gt;

&lt;P&gt;The cron parameters, * * * * *, correspond to minute hour day month day-of-week.&lt;/P&gt;

&lt;P&gt;*/5 * * * *       Every 5 minutes.&lt;BR /&gt;
*/30 * * * *      Every 30 minutes.&lt;BR /&gt;
0 */12 * * *      Every 12 hours, on the hour.&lt;BR /&gt;
*/20  * * * 1-5   Every 20 minutes, Monday through Friday.&lt;BR /&gt;
0 9 1-7 * 1       First Monday of each month, at 9am.&lt;/P&gt;

&lt;P&gt;Let me know if this is work out.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Aug 2016 12:53:10 GMT</pubDate>
    <dc:creator>hliakathali_spl</dc:creator>
    <dc:date>2016-08-04T12:53:10Z</dc:date>
    <item>
      <title>i am looking for a particular string match in a log file. whenever it sees the String it should alert me with an email.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209157#M61101</link>
      <description>&lt;P&gt;Kindly help me with crontab schedule and Trigger Conditions. Am confused in that part. If string matches what should be the trigger condition?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 14:04:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209157#M61101</guid>
      <dc:creator>priyankamundarg</dc:creator>
      <dc:date>2016-08-02T14:04:09Z</dc:date>
    </item>
    <item>
      <title>Re: i am looking for a particular string match in a log file. whenever it sees the String it should alert me with an email.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209158#M61102</link>
      <description>&lt;P&gt;Create a search like this&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=yourindexname sourcetype=sourcetypename "matchingstringhere"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Save this as an alert. For schedule you can choose to run it at whatever frequency you would like. For trigger condition, choose "if number of events greater than" 0. For alert mode, select once.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2016 15:08:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209158#M61102</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-08-02T15:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: i am looking for a particular string match in a log file. whenever it sees the String it should alert me with an email.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209159#M61103</link>
      <description>&lt;P&gt;You can use particular event code or event description in search string, whenever if any violation happens or particular string match in a log file you will get an alert &lt;/P&gt;

&lt;P&gt;Example:  if account is locked out we will get an alert  immediately by creating the alert by using below query,&lt;/P&gt;

&lt;P&gt;index=winsec EventCodeDescription="A user account was locked out" OR E ventCode = 4740|dedup user| stats count by user _time host&lt;/P&gt;

&lt;P&gt;Example for Crontab schedule: &lt;/P&gt;

&lt;P&gt;The cron parameters, * * * * *, correspond to minute hour day month day-of-week.&lt;/P&gt;

&lt;P&gt;*/5 * * * *       Every 5 minutes.&lt;BR /&gt;
*/30 * * * *      Every 30 minutes.&lt;BR /&gt;
0 */12 * * *      Every 12 hours, on the hour.&lt;BR /&gt;
*/20  * * * 1-5   Every 20 minutes, Monday through Friday.&lt;BR /&gt;
0 9 1-7 * 1       First Monday of each month, at 9am.&lt;/P&gt;

&lt;P&gt;Let me know if this is work out.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2016 12:53:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/i-am-looking-for-a-particular-string-match-in-a-log-file/m-p/209159#M61103</guid>
      <dc:creator>hliakathali_spl</dc:creator>
      <dc:date>2016-08-04T12:53:10Z</dc:date>
    </item>
  </channel>
</rss>

