Alerting

Alert with email

pudanelilita
Explorer

Hi,
I'm struggling to create email alert.
My search query:
| rex "Heap:\s(?<HeapNum>[\d\.]+)(?<unit>\w+)" | search HeapNum!=" " | eval HeapNum = case(unit="K",HeapNum/1000,unit="M", HeapNum,unit="G", HeapNum*1000) | eval critical=15000 | table _time HeapNum critical

I want, that when it reaches critical value, it sends email to me.
I created alert, but it doesn't work, can you please help with configuration?

alt text

alt text

Tags (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi pudanelilita,
try something like this

| rex "Heap:\s(?<HeapNum>[\d\.]+)(?<unit>\w+)" 
| search NOT HeapNum=" "  
| eval HeapNum = case(unit="K",HeapNum/1000,unit="M", HeapNum,unit="G", HeapNum*1000) 
| search HeapNum>15000 
| table _time HeapNum critical

Then in the alert's condition put activation when there are results (results>0)

Bye.
Giuseppe

View solution in original post

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi pudanelilita,
try something like this

| rex "Heap:\s(?<HeapNum>[\d\.]+)(?<unit>\w+)" 
| search NOT HeapNum=" "  
| eval HeapNum = case(unit="K",HeapNum/1000,unit="M", HeapNum,unit="G", HeapNum*1000) 
| search HeapNum>15000 
| table _time HeapNum critical

Then in the alert's condition put activation when there are results (results>0)

Bye.
Giuseppe

0 Karma

pudanelilita
Explorer

it shows me: No results found.

0 Karma

gcusello
SplunkTrust
SplunkTrust

At first (my error!) replace

| search HeapNum>15000 

with

| where HeapNum>15000 

if you still have no results, delete the second search and then see what are the values you have for HeapNum to check if the condition is correct.

Bye.
Giuseppe

0 Karma
Get Updates on the Splunk Community!

See just what you’ve been missing | Observability tracks at Splunk University

Looking to sharpen your observability skills so you can better understand how to collect and analyze data from ...

Weezer at .conf25? Say it ain’t so!

Hello Splunkers, The countdown to .conf25 is on-and we've just turned up the volume! We're thrilled to ...

How SC4S Makes Suricata Logs Ingestion Simple

Network security monitoring has become increasingly critical for organizations of all sizes. Splunk has ...