Alerting

alerts query

roopeshetty
Path Finder

Hi Guys,

 

We have a alert setup for below query with condition when ever there is Number of Result greater than 0.

 

<query>| table ServerName UserName  SupportTeam

 

This query runs once in a day and triggers the alerts perfectly as expected. But now the management wants some modifications in alerting condition in such a way that trigger a alert if any ServerName is present continuously in 3 runs then only it should trigger the alert.

 

Example : If ServerName "APAC_Japan01” present in output of all 3 days query, then only it should alert for this ServerName, if it presents only on 1st and 2nd day output results then it should not trigger the alert. Can this be possible?

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You can change your query so that it covers 3 days and buckets by day, and count the days which have greater than 0 results.

0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...