Alerting

How to create alert when input file received whereas output file not created?

splunklearner99
Engager

Hello Masters,

I've the index

index="xxx_generic_app_audit_prd" sourcetype="xxx:designeng:syslog" host="15.250.99.*" OR host="15.246.49.*" "*/testshare/APP1/OUT/*" AND "BANP3*" | search "Subsystem: XCOM" AND "Event Number: 01"

Log is coming as below:

Dec 5 14:30:43 Web ViewPoint Enterprise: Owner: XCOM Subsystem: XCOM Event Number: 01 Generation TIme: 2022-12-05 14:30:41 Text: XCOM: File Receive ended REQ 086694, Remote LU 10.38.46.122, File $PRD10.FILE01.C221205C Remotefile /testshare/APP1/OUT/C221205C 341797 bytes, 3336 records in 234564 microsec Event Type: Normal Process: \BANP3.$X2LD Content Standard: Subject: Custom Text: Source: WVPE Passvalue: 0 Node Name: \BANP3
host = 15.246.49.129
index = xxx_generic_app_audit_prd
source = /syslogdata/dns/test.internal.xxx/logs/2022-12-05/hp/15.246.49.129/2022-12-05-14_user.log
sourcetype = xxx:designeng:syslog

Where as once the input file is received, the application job should process this file and complete. The log for completed job as follows.

index="xxx_generic_app_audit_prd" sourcetype="xxx:designeng:syslog" host="15.250.44.*" OR host="15.246.44.*" "BANP3*" | search "Subsystem: 800" AND "Event Number: 42"

Dec 5 15:00:14 Web ViewPoint Enterprise:
Owner: DELUXE
Subsystem: 800
Event Number: 42
Generation TIme: 2022-12-05 15:00:13
Text: CBM042 Batch finished, Chg=B221205C, Recs=3336, Errs=0
Event Type: Normal
Process: \BANP3.$X3F1
Content Standard:
Subject:
Custom Text:
Source: WVPE
Passvalue: 0
Node Name: \BANP3
host = 15.246.44.129index = xxx_generic_app_audit_prd source = /syslogdata/dns/test.internal.xxx/logs/2022-12-05/hp/15.246.49.129/2022-12-05-14_user.log
sourcetype = xxx:designeng:syslog

My requirement is to marry both these logs and create a alert only when input file is received, where as no log for output file. Could you please assist

Labels (1)
0 Karma

isoutamo
SplunkTrust
SplunkTrust

Hi

How you are matching those two events to be sure that those belongs each other?

I could find that only source has exactly same values on both event, but I suspect that this source contains lot of different events? Does it contains events for one hour?

r. Ismo

0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...