Splunk Search

Alert set for count in range

cbiraris
Path Finder

Hi Team,

I am trying to setup an alert if the count of errors are in range of  between 10 to19(more then 10 and less than 19). 

for example:

index=abc sourcetype=xyz "errors"
only if count >= 10 AND count <=19, should only trigger alert.


please help

thank you




Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| where count >= 10 AND count <=19

Then trigger your alert if there are any results

0 Karma

cbiraris
Path Finder

Thank you its working

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...