Splunk Search

Can you help me with a query I have for an alert?

naomibn
Explorer

Hello experts,

I am new to Splunk. I have a file with below values. I have Indexed time as well. I need to write a query to alert for if any id has text=started and consequent 2 other texts ( it can be anything) for the same id in < 5 minutes.

id text
123 started
123 in progress
123 halted
213 started
213 finished
456 started
456 running
456 in progress

Kindly help.

I tried:

index=test  text="started" |stats count by id. But that is showing only the started ones and does not have the other texts . The other texts are random so cannot specify in a search.

Thanks a lot,

Cheers,
Naomi

0 Karma

HiroshiSatoh
Champion

Is this search helpful?

 (your search)
| transaction id maxspan=5m startswith="started"
| where eventcount>2
0 Karma
Get Updates on the Splunk Community!

Cloud Platform | Customer Change Announcement: Email Notification Will Be Available ...

The Notification Team is migrating our email service provider since currently there’s no support ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...