Splunk Search

How to combine multiple searches in same alert

SG
Path Finder

HI,

I have 3 searches that give results for errors and journey length. I wanted to add all these searches together and send an alert when it breaches the threshold values. Can you please help me with how to combine these three searches so that we get them in a single alert?

Search queries I wanted to combine - 

Journey completion time

 

index=nextgen sourcetype=lighthouse_json sourcetype=lighthouse_json datasource=webpagetest  | timechart span=1h avg(duration) AS "Journey completion time"

 

Errors

 

index=nextgen sourcetype=lighthouse_json sourcetype=lighthouse_json datasource=webpagetest errorORstatuscode=500 OR errorORstatuscode=4* NOT url="*sentry*" | timechart span=1h count(step) by step

 

Error status codes 

 

index=nextgen sourcetype=lighthouse_json sourcetype=lighthouse_json datasource=webpagetest errorORstatuscode=500 OR errorORstatuscode=4* NOT url="*sentry*" | table _time, step, url, errorORstatuscode

 

Thanks,

Swetha. G

Labels (1)
Tags (1)
0 Karma
Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...