Alerting
Highlighted

Alert Query

New Member

Hi,

I have to search the string below
Error Code : 5010 | Barcodes {X}
X is some value, and it can be change frequently, I need to raise an alert when one barcode is repeating twice and not raising the alert for same barcode throughout a day.
What should be my search, and how can I display for which barcode I have raised the alert.
Thanks in Advance

Tags (1)
0 Karma
Highlighted

Re: Alert Query

Motivator

Given you have not extracted your fields yet you could try it like this:

 <base search> | rex field=_raw "Error\sCode\s:\s(?<error_code>[\d]+)\s\|\sBarcodes\s\{(?<barcodes>[^\}]+)" | where error_code=5010 | stats count by barcodes | where count > 1

Save the search as an alert and set the trigger condition to number of results greater than 0, and alert for each result, activate throtteling and set the throttle period to 1 day.

Then you may add any desired alert action.

0 Karma
Highlighted

Re: Alert Query

New Member

@DMohn
Thank you very much the reply
My log snippet looks like below
Error Code : 5010 | Barcodes 000323334011 |
if the above mentioned Barcode is repeating twice then I should raise an alert,

The barcode can change frequently.

Can you please suggest.

0 Karma
Highlighted

Re: Alert Query

Motivator

@FayazAhmed Please use the following search:

 <base search> | rex field=_raw "Error\sCode\s\:\s(?<error_code>[\d]+)\s\|\sBarcodes\s(?<barcodes>[\d]+)\s" | where error_code=2010 | stats count by barcodes | where count > 1 | table barcodes

It should do exactly what you want. Just replace the <base search> part with a search that shows your desired logs (like index=mylogs sourcetype=barcode_errors or similar).

Then use the "Save as" link in the right top above the search bar, save as Alert, set a schedule time as desired, set the trigger condition to "number of results" greater than 0, set to alert for each result, and set throtteling to 1 day.

Happy Splunking!

0 Karma
Highlighted

Re: Alert Query

SplunkTrust
SplunkTrust

@FayazAhmed

I think you query should be like below.

index=your_index "Error Code : 5010" Barcodes=* | stats count by Barcodes  |where count=2

OR

if your events have Error_Code field then

index=your_index Error_Code=5010 Barcodes=* | stats count by Barcodes  |where count=2

Create an alert using any of above search. Use below link to create search.

https://docs.splunk.com/Documentation/Splunk/7.2.3/Alert/Alertexamples

for not raising the alert for same barcode throughout a day, you have to set Throttle with field=Barcodes and Throttle period is 1 day.

https://docs.splunk.com/Documentation/Splunk/7.2.3/Alert/Alertexamples#Throttle_the_real-time_alert

Thanks

0 Karma
Highlighted

Re: Alert Query

New Member

Hi @kamlesh_vaghela

Thank you for the help,

The search didn't help my query

My log snippet looks like below
Error Code : 5010 | Barcodes 000323334011 |
if the above mentioned Barcode is repeating twice then I should raise an alert,

The barcode can change frequently.

Can you please suggest.

0 Karma
Highlighted

Re: Alert Query

SplunkTrust
SplunkTrust

You can find duplicate barcodes using a query like this one.

<your search for barcodes> earliest=@d | stats count by Barcodes | where count > 1

Prevent multiple alerts by using the Throttle option in the alert configuration.

---
If this reply helps you, an upvote would be appreciated.
0 Karma