Splunk Search

How to use a field in lookup table as search count

New Member

I have a lookup table with 3 fields/columns: Service, Priority, Threshold. If the search on service count is > (value of Threshold in lookup table) then send an alert.

Service Priority Threshold
Output P2 25
Input P3 10
Both P2 35

If search result > Threshold then send alert. What would my search look like?
index=xxx service=* | lookup tablename Service OUTPUT Service, Priority, Threshold | stats count by Service Threshold
if count is > Threshold

Tags (1)
0 Karma

Ultra Champion

looks good, but use |where count>threshold

If my comment helps, please give it a thumbs up!
0 Karma
Get Updates on the Splunk Community!

.conf23 | Get Your Cybersecurity Defense Analyst Certification in Vegas

We’re excited to announce a new Splunk certification exam being released at .conf23! If you’re going to Las ...

Starting With Observability: OpenTelemetry Best Practices

Tech Talk Starting With Observability: OpenTelemetry Best Practices Tuesday, October 17, 2023   |  11AM PST / ...

Streamline Data Ingestion With Deployment Server Essentials

REGISTER NOW! Every day the list of sources Admins are responsible for gets bigger and bigger, often making ...