Alerting

How do you create an alert which compares two different query counts?

amarpravin
New Member

I have two querys :-

1st Query (this query gives me the total number of counts which match with log "data * is successfully created") :-

index=abc  "Data * is successfully created"  | stats count

2nd Query (this query gives me total message posted to kafka):-

index="abc" ("Data * is successfully posted to kafka topic") | rex "random=(?.*)}]" |  eval nowstring=strftime(now(), "%Y-%m-%d") | stats count

Now I want to create an alert based on 1st and 2nd query count:
E.g. if 1st query count != 2nd query count, trigger an alert.

Could you please help me to create this query ?

Tags (3)
0 Karma
1 Solution

HiroshiSatoh
Champion

It is the case when it made it as a search sentence as it is.

(1st Query )
| stats count as count_1
| appendcols 
    [search (2st Query )
| stats count as count_2]
| where count_1!=count_2

View solution in original post

0 Karma

HiroshiSatoh
Champion

It is the case when it made it as a search sentence as it is.

(1st Query )
| stats count as count_1
| appendcols 
    [search (2st Query )
| stats count as count_2]
| where count_1!=count_2
0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...