<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: To set an alert if a field doesn't exist in  log messages in real time in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38961#M8888</link>
    <description>&lt;P&gt;Are you sure there were results in the last 15 minutes?&lt;/P&gt;

&lt;P&gt;Did you specify the time as 'index= "metering" sourcetype="ping" earliest=-15m | rex "Ping response: (?&lt;PINGMESSAGE&gt;.)" | search PingMessage=":OK*" ' ?&lt;/PINGMESSAGE&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Aug 2013 16:32:32 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2013-08-19T16:32:32Z</dc:date>
    <item>
      <title>To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38954#M8881</link>
      <description>&lt;P&gt;I'm trying to set up a alert If I don't see a log message with in 15 minutes span of time. &lt;BR /&gt;
I extracted a filed from the log message but I'm not sure how to check for the field in real time .&lt;/P&gt;

&lt;P&gt;The query i tired is &lt;/P&gt;

&lt;P&gt;index= "metering" host="vm10190" sourcetype="ping" | rex "Ping response: (?&lt;PINGMESSAGE&gt;.&lt;EM&gt;)" | search PingMessage="*OK&lt;/EM&gt;" | bucket _time span=15m | stats count by _time host |  where count&amp;lt;1&lt;/PINGMESSAGE&gt;&lt;/P&gt;

&lt;P&gt;Any help would be greatly appreciated . &lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:36:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38954#M8881</guid>
      <dc:creator>ssankeneni</dc:creator>
      <dc:date>2020-09-28T14:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38955#M8882</link>
      <description>&lt;P&gt;For alerting, you need to setup a save search and schedule it.  Then, you can alert based on the results of the saved search. Is the search above your saved search?&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 15:44:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38955#M8882</guid>
      <dc:creator>richnavis</dc:creator>
      <dc:date>2013-08-19T15:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38956#M8883</link>
      <description>&lt;P&gt;Yes, It is a saved search but it is incorrect and it is not returning any results&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 15:45:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38956#M8883</guid>
      <dc:creator>ssankeneni</dc:creator>
      <dc:date>2013-08-19T15:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38957#M8884</link>
      <description>&lt;P&gt;Create a search that finds your log messages.  Then schedule that search and have it send an alert if the event count = 0.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 15:50:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38957#M8884</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2013-08-19T15:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38958#M8885</link>
      <description>&lt;P&gt;I am not sure how to create a search query to return the results for just last 15 minutes&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 15:58:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38958#M8885</guid>
      <dc:creator>ssankeneni</dc:creator>
      <dc:date>2013-08-19T15:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38959#M8886</link>
      <description>&lt;P&gt;Include 'earliest=-15m' in your search query.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 16:02:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38959#M8886</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2013-08-19T16:02:49Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38960#M8887</link>
      <description>&lt;P&gt;index= "metering"  sourcetype="ping" | rex "Ping response: (?&lt;PINGMESSAGE&gt;.&lt;EM&gt;)" | search PingMessage="&lt;/EM&gt;:OK*" &lt;/PINGMESSAGE&gt;&lt;/P&gt;

&lt;P&gt;this query returns me the results where the ping is ok &lt;BR /&gt;
but when I add the time it doesn't return any results&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 16:15:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38960#M8887</guid>
      <dc:creator>ssankeneni</dc:creator>
      <dc:date>2013-08-19T16:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38961#M8888</link>
      <description>&lt;P&gt;Are you sure there were results in the last 15 minutes?&lt;/P&gt;

&lt;P&gt;Did you specify the time as 'index= "metering" sourcetype="ping" earliest=-15m | rex "Ping response: (?&lt;PINGMESSAGE&gt;.)" | search PingMessage=":OK*" ' ?&lt;/PINGMESSAGE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 16:32:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38961#M8888</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2013-08-19T16:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38962#M8889</link>
      <description>&lt;P&gt;I do get the results now can you please let me know how to use the eventcount in this case&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 16:44:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38962#M8889</guid>
      <dc:creator>ssankeneni</dc:creator>
      <dc:date>2013-08-19T16:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38963#M8890</link>
      <description>&lt;P&gt;Go to the 'Searches and Reports' manager page and click the New button.  Enter your search query in the Search box, start time of '-15m' and end time of 'now'.  Check the 'Schedule this search' box.  Choose "15 minutes" from the 'Run every' box.  Under Condition, choose 'if number of events' and 'is equal to' from the respective drop-downs.&lt;/P&gt;

&lt;P&gt;Choose the alert action and save the search.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 16:52:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38963#M8890</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2013-08-19T16:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: To set an alert if a field doesn't exist in  log messages in real time</title>
      <link>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38964#M8891</link>
      <description>&lt;P&gt;Thanks for your answer&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2013 17:08:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/To-set-an-alert-if-a-field-doesn-t-exist-in-log-messages-in-real/m-p/38964#M8891</guid>
      <dc:creator>ssankeneni</dc:creator>
      <dc:date>2013-08-19T17:08:46Z</dc:date>
    </item>
  </channel>
</rss>

