Alerting

Custom request on Splunk alerting

manja054
Explorer

What am i looking for: My search results contains Count field.

1) if Count greater than Zero should alert once and after alerting once it shouldn't alert till 00:00 AM. (I am writing results from 1st alert in a csv file)

2) if number increases by 5 from that of no. in CSV (csv+5), i should trigger an alert once and after alerting once it shouldn't alert till 00:00 AM

3) if number increases by 10 from that of no. in CSV (Csv+10), i should trigger an alert once and after alerting once it shouldnot alert till 00:00AM

I have to run the query for every 15 min.

Tags (1)
0 Karma

FritzWittwer_ol
Contributor

I would try

...your search...

| eval ts=strftime(_time, "%x") | fields ts
| lookup your_search_key ts OUTPUTNEW count_from_ts
| eval count_from_csv=if(isnull(count_from_csv),-4.count_from_csv)
| eval new=if(count>=count_from_csv+5,1,0)
| search new=1
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...