Alerting

Conditional alerting examples?

the_wolverine
Champion

I'm trying to set up a conditional alert where if there are less than 50 results but greater than 0 results, I want to be alerted. It seems straightforward but I can't figure out the syntax of the condition to use. The following does not work, for example:

mysearch | stats count dc(memberUid)

condition: 0 < dc(memberUid) < 50

1 Solution

ftk
Motivator

Try renaming your distinct count field.

mysearch | stats count dc(memberUid) as dc_uid

condition: 0 < dc_uid < 50

View solution in original post

ftk
Motivator

Try renaming your distinct count field.

mysearch | stats count dc(memberUid) as dc_uid

condition: 0 < dc_uid < 50

the_wolverine
Champion

That worked. Thanks 🙂

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...