<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to alert when a certain field changes from a value to another random value? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211354#M61817</link>
    <description>&lt;P&gt;Please share couple of events. Have you extracted these columns as KV pairs? That will have to be your first step. &lt;A href="https://docs.splunk.com/Documentation/Splunk/6.4.2/Admin/Transformsconf"&gt;https://docs.splunk.com/Documentation/Splunk/6.4.2/Admin/Transformsconf&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Once you have fields extracted, you can do a search with &lt;CODE&gt;earliest=-5m&lt;/CODE&gt;, this will alert you of any changes in the past 5 mins. Since this is an extracted field, real-time search may not work correctly.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Aug 2016 20:25:11 GMT</pubDate>
    <dc:creator>sundareshr</dc:creator>
    <dc:date>2016-08-03T20:25:11Z</dc:date>
    <item>
      <title>How to alert when a certain field changes from a value to another random value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211352#M61815</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;

&lt;P&gt;I want to create an alert by email when one of the fields of my index changes. I have a file with different counters with values associated (one column for the counters name and one column for the value).&lt;/P&gt;

&lt;P&gt;I would like to be notified by email when the value of one specific counter changes.&lt;BR /&gt;
I’ve read the documentation about real time alert, but I didn’t find anything that could help me. &lt;BR /&gt;
Example: Let's say that I am interested in the "counter_1". If the value of counter_1 change I would like to be alerted. &lt;/P&gt;

&lt;P&gt;Could you help me with that issue?&lt;BR /&gt;
Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:30:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211352#M61815</guid>
      <dc:creator>clairebesson</dc:creator>
      <dc:date>2020-09-29T10:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to alert when a certain field changes from a value to another random value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211353#M61816</link>
      <description>&lt;P&gt;If I read you right, then counter_1 is always X. So, setup the alert to exclude expected results, like X. But if counter_1=Y, the search will return a result, and you can alert on that. So...&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt; basesearch NOT counter_1=expectedvalue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;And then setup the alert to run at whatever interval, and alert if number of results is greater than one?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 10:30:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211353#M61816</guid>
      <dc:creator>JDukeSplunk</dc:creator>
      <dc:date>2020-09-29T10:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to alert when a certain field changes from a value to another random value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211354#M61817</link>
      <description>&lt;P&gt;Please share couple of events. Have you extracted these columns as KV pairs? That will have to be your first step. &lt;A href="https://docs.splunk.com/Documentation/Splunk/6.4.2/Admin/Transformsconf"&gt;https://docs.splunk.com/Documentation/Splunk/6.4.2/Admin/Transformsconf&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Once you have fields extracted, you can do a search with &lt;CODE&gt;earliest=-5m&lt;/CODE&gt;, this will alert you of any changes in the past 5 mins. Since this is an extracted field, real-time search may not work correctly.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2016 20:25:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211354#M61817</guid>
      <dc:creator>sundareshr</dc:creator>
      <dc:date>2016-08-03T20:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to alert when a certain field changes from a value to another random value?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211355#M61818</link>
      <description>&lt;P&gt;Setup a search to run &lt;CODE&gt;every X minutes&lt;/CODE&gt; and &lt;CODE&gt;over the last X+1 minutes&lt;/CODE&gt; (where &lt;CODE&gt;X&lt;/CODE&gt; is the same number) and search this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;... | stats dc(counter_1) AS numValues | search numValues&amp;gt;1
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 06 Aug 2016 23:55:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-alert-when-a-certain-field-changes-from-a-value-to/m-p/211355#M61818</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2016-08-06T23:55:02Z</dc:date>
    </item>
  </channel>
</rss>

