Alerting

custom alert condition for alert

anoopambli
Communicator

Can someone help me with this, i am pretty new to splunk and getting stuck with a custom alert condition. This is the search which i am using.

index=coreops sourcetype="sitescope_runmonitor" "ERROR - skipped #5" | top host by remoteHost | rename host AS SiS_Manager

gives me following result,

remoteHost SiS_Manager Count percent
eiman122vwin ei0760vwin 1 100.00000

I want to use trigger if custom conditions to match the value in count column and alert if any value is found higher thatn 5. I tried to use count>5 but that doesnt work. Any help would be really appreciated.

Anoop

Tags (1)
0 Karma

alacercogitatus
SplunkTrust
SplunkTrust

You could setup your search as such:

index=coreops sourcetype="sitescope_runmonitor" "ERROR - skipped #5" | top host by remoteHost | rename host AS SiS_Manager | where count > 4

and then in your alert, set the condition to "if number events > 0"

alacercogitatus
SplunkTrust
SplunkTrust

You want to use the "if number events" condition, not custom condition, and then put a 0 in the box.

0 Karma

anoopambli
Communicator

Not sure if iam trying anything wrong in the custom condition, but getting this error message,

Cannot parse alert condition. Error in 'SearchParser': Missing a search command before '"'.

I am getting this error on Create alert, trigger if custom condition.

0 Karma

eroncampello
Splunk Employee
Splunk Employee

I was facing the same issue, I used the following condition and is working fine 

search result_of_search > 10

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...