<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to trigger savedsearch on state change and match fields? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301536#M90790</link>
    <description>&lt;P&gt;Example events:&lt;BR /&gt;
     host1,message,service1,status&lt;BR /&gt;
     host2,message,service1,status&lt;BR /&gt;
     host1,message,service2,status&lt;/P&gt;</description>
    <pubDate>Tue, 03 Apr 2018 15:00:14 GMT</pubDate>
    <dc:creator>andrei1bc</dc:creator>
    <dc:date>2018-04-03T15:00:14Z</dc:date>
    <item>
      <title>How to trigger savedsearch on state change and match fields?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301534#M90788</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I have the following events:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;host1,message,service1,status
host2,message,service1,status
host1,message,service2,status
...
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Fields extracted as&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;host[x] -&amp;gt; C_Host
message -&amp;gt; C_Message
service[x] -&amp;gt; C_service
status -&amp;gt; C_status
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;alert_actions.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[update]
payload_format = json
param.instance = 
param.message = 
label = UpdateC
param.end_point_id = 
icon_path = alert_udapte_cam.png
is_custom = 1
description = 
param.status = 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;savedsearches.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[Update]
action.update = 1
action.update.param.instance = $result.C_Service$
action.update.param.message = $result.C_Message$
action.update.param.end_point_id = $result.C_Host$
action.update.param.status = $result.C_Status$

alert.digest_mode = 0
alert.suppress = 1
alert.suppress.period = 15m
alert.suppress.fields = $result.C_Service$
alert.track = true

counttype = number of events
cron_schedule = */1 * * * *
disabled = 1
dispatch.earliest_time = -1m
dispatch.latest_time = now
enableSched = 1
quantity = 0
relation = greater than
request.ui_dispatch_app = search
request.ui_dispatch_view = search
search = index=c_alerting sourcetype=c_index_update earliest=-1m
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The need is to trigger the alert when the status changes and than silence for 15 min, by matching the service to it's host and status. &lt;/P&gt;

&lt;P&gt;Please assist with the conditioning above, as I am sure that does not look right &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 14:31:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301534#M90788</guid>
      <dc:creator>andrei1bc</dc:creator>
      <dc:date>2018-04-03T14:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger savedsearch on state change and match fields?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301535#M90789</link>
      <description>&lt;P&gt;hello there,&lt;BR /&gt;
i would suggest to try and capture the condition in search and alert on "true" statement. in other words, create a search that captured an event you would like to alert on its existence.&lt;BR /&gt;
as i am not sure what you mean by  "silence for 15 min", can you provide a sample data so we can assist with a search?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 14:43:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301535#M90789</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2018-04-03T14:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to trigger savedsearch on state change and match fields?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301536#M90790</link>
      <description>&lt;P&gt;Example events:&lt;BR /&gt;
     host1,message,service1,status&lt;BR /&gt;
     host2,message,service1,status&lt;BR /&gt;
     host1,message,service2,status&lt;/P&gt;</description>
      <pubDate>Tue, 03 Apr 2018 15:00:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-trigger-savedsearch-on-state-change-and-match-fields/m-p/301536#M90790</guid>
      <dc:creator>andrei1bc</dc:creator>
      <dc:date>2018-04-03T15:00:14Z</dc:date>
    </item>
  </channel>
</rss>

