Alerting

How to trigger alert when there is switch between events for the first time?

paragg
Loves-to-Learn Lots

I want to get an alert when there is switch between events for the first time. Below is the example for this. 

index=abc sourcetype=xyz  <warning>

index=abc sourcetype=xyz  <critical>


These 2 queries I have and I want an alert when there is switch between from <warning> to <critical>.

Please help with the query.

Labels (1)
0 Karma

bowesmana
SplunkTrust
SplunkTrust

You should look at using streamstats - here's an example that creates 10 events where every 4th event changes from warning to critical.

| makeresults count=10
| streamstats c
| eval _time=now() - c
| eval type=if(c % 4 = 0, "critical", "warning")
| fields - c
| sort - _time
| streamstats count reset_after="("type=\"warning\"")" by type
| where count=1 AND type="critical"

To give you an exact solution would need to know more about your requirement.

This will give 2 results when the type changes to critical from warning

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...