Splunk Cloud Platform

How to trigger custom alert with source condition

PotatoDataUser
Explorer

I have a index with 7 sources of which I utilize 4 sources.

The alert outputs data to a lookup file as its alert function and is written something like this.

index=my_index  source=source1 OR source=source2 OR source=source3 OR source=source4
stats commands
eval commands
table commands etc.

I want to configure the alert to run only when all the four sources are present.
I tried doing this.

PotatoDataUser_1-1731928388752.png

But the alert isnt running even when all 4 sources are present.

Please help me on how to configure this.



Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Is your search wide enough to cover events from all four sources? Does the alert trigger if you reduce it to 3?

0 Karma

PotatoDataUser
Explorer

Yes the search covers all 4 sources, when I run the search manually and check the events I see all the 4 sources present.

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...