Splunk Search

How to set up an alert to send an email with the output of another search?

kmasood
Explorer

I have an alert that sends emails when process count goes above a certain level. When these conditions are met, I would like Splunk to send an email with the output of another search command. For e.g.,

Alert search (already works):

index="os" host="host1*" sourcetype="top" COMMAND="httpd" | stats count

Follow-up search (run if previous alert's conditions are met):

index="apps" host="host1*" sourcetype="access*" | stats count(uri) by clientip,uri

How does one configure such (cascading?) alerts?

0 Karma

somesoni2
Revered Legend

Try this.
Change the search of your current alert search to this and change the alert condition to "when number of greater than 0" . THis search will return events only if the where conditions are met.

 index="os" host="host1*" sourcetype="top" COMMAND="httpd" | stats count | where count > YOURLIMIT| map search="search      index="apps" host="host1*" sourcetype="access*" | stats count(uri) by clientip,uri"

kmasood
Explorer

That looks great, could you add a little bit of explanation of how this uses the map command? I'm not sure I understand "Looping operator, performs a search over each search result." from the docs.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...