Splunk Search

Is it possible to create an alert only if a certain condition is not met?

santosh1
Explorer

So I want to create an alert if one of our server is not connected, but the server disconnects automatically for every 12 hours and reconnects again in a few minutes, so I only need an alert triggered if the server does not reconnect within 10minutes of it getting disconnected.

*SourceName="AppLog" Message="service status *"*

there are two logs that occur, one is service status started and service status stopped. I need the alert triggered only if the service status started log does not appear within 10min of service stopped log message

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Create a report that looks back over the previous 15 minutes for started and stopped messages, find the time of the latest message, and if the latest message is stopped and more than 10 minutes ago, keep the event. If you schedule the report to run every minute or at worst every 5 minutes, you should be able to capture when the server has not started in time

0 Karma

santosh1
Explorer

Could you possibly show it to me as an example syntax I can use. I am new the Splunk Search Syntax

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...