All Apps and Add-ons

How to configure a custom alert on the basis of count of single unique field value?

schiwark
Explorer

I want to configure an alert where alert should trigger if any unique value from field A is 5 or more than 5 in last 10 minutes.

I was able to configure the above part but along with the field A I also want the values of field B in an inline table of an alert which are associated with field A.

Can someone suggest me on this?

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @schiwark,

did you tried something like this?

your_search earliest=-10m@m latest=now
| stats values(fieldB) AS fieldB count BY fieldA
| where count>10

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Dashboards: Hiding charts while search is being executed and other uses for tokens

There are a couple of features of SimpleXML / Classic dashboards that can be used to enhance the user ...

Splunk Observability Cloud's AI Assistant in Action Series: Explaining Metrics and ...

This is the fourth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how ...

Brains, Bytes, and Boston: Learn from the Best at .conf25

When you think of Boston, you might picture colonial charm, world-class universities, or even the crack of a ...