Splunk Search

I want no. of triggered alerts in a day from total alerts to be generated

zakkie
Engager

I want a report when total events less than 9500000 in a day from sourcetype.

Also I tried below query, but its giving me count as 0.

| tstats count where index="cb_protect" sourcetype = "carbonblack:protect" subtype=* | search count<9500000

Need a help in this scenario

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

If subtype is not an indexed field then tstats won't find it.  Try the same search without subtype or use a non-tstats search.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...