Splunk Search

Is it possible to create an alert only if a certain condition is not met?

santosh1
Explorer

So I want to create an alert if one of our server is not connected, but the server disconnects automatically for every 12 hours and reconnects again in a few minutes, so I only need an alert triggered if the server does not reconnect within 10minutes of it getting disconnected.

*SourceName="AppLog" Message="service status *"*

there are two logs that occur, one is service status started and service status stopped. I need the alert triggered only if the service status started log does not appear within 10min of service stopped log message

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Create a report that looks back over the previous 15 minutes for started and stopped messages, find the time of the latest message, and if the latest message is stopped and more than 10 minutes ago, keep the event. If you schedule the report to run every minute or at worst every 5 minutes, you should be able to capture when the server has not started in time

0 Karma

santosh1
Explorer

Could you possibly show it to me as an example syntax I can use. I am new the Splunk Search Syntax

0 Karma
Get Updates on the Splunk Community!

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...

Splunk App for Anomaly Detection End of Life Announcement

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...