Splunk Enterprise Security

Correlation Search - Search to either email or allow notable event to be fired.

llmillerjr
Observer

We have some users asking for Notable Events and emails depending on search results.

Example...If the number of errors returned the last 5 minutes is < 5, send an email.  If > 5 allow notable event to be generated.

I don't want to create 2 searches for this (alert and correlation search).  Is it possible to write 1 search to  accomplish this?

Labels (1)
0 Karma

thambisetty
SplunkTrust
SplunkTrust

I don't think its possible with default Splunk alert action behavior.

————————————
If this helps, give a like below.
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...