All Apps and Add-ons

Searching log for number that is = to or > than

sunsan
Engager

I have a log file that logs date/time and a file count number. I need to set up an alert that will notify us when this file count is = to or > than a specific number. Any thoughts on how I can do this?

emiller42
Motivator

So the trick is to extract the number as a field first. You can do this inline, but eventually you'll want to set up a field extraction for it.

To do the inline version, you'll want to rex out the field, like so:

sourcetype=mylogs | rex "\d+:\d+:\d+\s(?<fileCount>\d+)$" | where fileCount>=25

Now, if you take that same regex and use it to make a field extraction, then your search would simply be:

sourcetype=mylogs fileCount>=25

Narj
Path Finder

Have you already extracted the file count number field? It's simple to have a saved search eg:

sourcetype=mylogs file_count >=25

Then edit it to run however often you need and set up an alert to trigger where the number of results are more than zero (eg: email).

0 Karma

sunsan
Engager

Thank you for responding. I don't think I explained very well.

Here is a sample of my log.

09/27/2013 11:16:02 691
09/27/2013 11:17:01 702
09/27/2013 11:18:02 727
09/27/2013 11:19:01 705

I need to be able to query on the number on the far right. (greater than or equal to X)

0 Karma
Get Updates on the Splunk Community!

Combine Multiline Logs into a Single Event with SOCK - a Guide for Advanced Users

This article is the continuation of the “Combine multiline logs into a single event with SOCK - a step-by-step ...

Everything Community at .conf24!

You may have seen mention of the .conf Community Zone 'round these parts and found yourself wondering what ...

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...