Alerting

How do i trigger a search if results count of another search are greater than 0?

jkat54
SplunkTrust
SplunkTrust

I have data coming into an index that tells me when a load is complete... these files are named *_done.txt

I have data coming into the same index that tells me the counts of errors etc related to the loads.

I want to trigger an alert that contains the errors that occurred in the load but only after the load completes and splunk receives a file with source=*_done.txt.

How can I do this?

Tags (1)
0 Karma
1 Solution

jkat54
SplunkTrust
SplunkTrust
[ 
makeresults count=1 
| eval trigger= [ search index=myindexsource=*_done.txt _index_earliest=-1h@h _index_latest=-0h@h | head 1 | stats count  | return $count]
| eval search=if( trigger > 0 , "Search to Run if results Count is greater than 0","search to run if results count is not greater than 0, could be null()")
]

I solved with the above

View solution in original post

0 Karma

jkat54
SplunkTrust
SplunkTrust
[ 
makeresults count=1 
| eval trigger= [ search index=myindexsource=*_done.txt _index_earliest=-1h@h _index_latest=-0h@h | head 1 | stats count  | return $count]
| eval search=if( trigger > 0 , "Search to Run if results Count is greater than 0","search to run if results count is not greater than 0, could be null()")
]

I solved with the above

0 Karma

jkat54
SplunkTrust
SplunkTrust

You can use this approach too:

| where trigger>0
| map search=“search to trigger”

0 Karma
Get Updates on the Splunk Community!

Introducing Edge Processor: Next Gen Data Transformation

We get it - not only can it take a lot of time, money and resources to get data into Splunk, but it also takes ...

Take the 2021 Splunk Career Survey for $50 in Amazon Cash

Help us learn about how Splunk has impacted your career by taking the 2021 Splunk Career Survey. Last year’s ...

Using Machine Learning for Hunting Security Threats

WATCH NOW Seeing the exponential hike in global cyber threat spectrum, organizations are now striving more for ...