Alerting

How to alert on conditions across multiple events and include the entire file in the email, not just the line with the error?

jwinderDDS
Path Finder

I have an application that generates logs that are not always in a consistent format. Also each time a process in this application executes it creates a whole new log file for that one execution.

I am running into a couple issues:
1) If I setup an alert to send an email anytime "error*" is found in one of these files, we would like the entire file included in the email, not just the line with the error. These alerts need to be filtered based on other information in the log file, such as only alert on "error*" if "something else" is not in the file.
2) I tried solving this by treating the entire file as a single event, but can't seem to make that happen because of the way the application opens, writes, then closed the log files multiple times.

So how can I search for error* in each event, but include the entire source in the alert email, or am I going about this wrong?

Thank you!

Jeremy

0 Karma
1 Solution

woodcock
Esteemed Legend

Try this:

error* | dedup source | map search = "source=$source$"

View solution in original post

0 Karma

woodcock
Esteemed Legend

Try this:

error* | dedup source | map search = "source=$source$"
0 Karma

jwinderDDS
Path Finder

Thank you!

This gave me the 'map search=' command I needed.

0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...