Alerting

Help creating alert criteria

jedatt01
Builder

I want to create an alert that will fire if Splunk see's a log message from two seperate sources in a 10 minute interval. For example one event from Source1 and one event from Source2. The problem i'm running into is that Source2 may send more than one event in a ten minute interval, but I only want the alert to fire if it see's at least one message from source1 and source2 in ten minutes. Anyone have any ideas?

Tags (1)
0 Karma
1 Solution

Ayn
Legend

How about using dedup? In your search:

... | dedup source

and then create the >=2 events alert condition as usual.

View solution in original post

0 Karma

Ayn
Legend

How about using dedup? In your search:

... | dedup source

and then create the >=2 events alert condition as usual.

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...