Splunk Search
Highlighted

Reading Event Counts for all indexes and then reading their corresponding Count for threshold Check Specified in the lookup File

Explorer

Can Please anyone help me in building the query for my alert so that It takes the index name and its corresponding threshold count from the above shred image of specified lookup table for threshold mapping without using Tstats command ? Sharing the screenshot of Static lookup file image below ?

Tags (2)
0 Karma
Highlighted

Re: Reading Event Counts for all indexes and then reading their corresponding Count for threshold Check Specified in the lookup File

Path Finder

There is no image associated with this question. Can you share the lookup data as text in your question and some idea of the search you are trying to join with?

0 Karma
Highlighted

Re: Reading Event Counts for all indexes and then reading their corresponding Count for threshold Check Specified in the lookup File

Explorer
0 Karma
Highlighted

Re: Reading Event Counts for all indexes and then reading their corresponding Count for threshold Check Specified in the lookup File

Path Finder

As I understand your question, you want to get the counts of events in indexes, then be able to compare them to a threshold from a lookup file.

I created a sample lookup file "indextest.csv" with indexname and threshold.

The serach below adds the threshold value to the event data for each index count:

| tstats count where index=* by index 
| lookup index_test.csv index_name AS index outputnew threshold 
| eval busted_limit=if(count>threshold,"BUSTED","OK")
| table index,busted_limit,count,threshold

You can use whatever search you want in line 1 to get a count by index.
Line 2 maps (looks up) the lookup file field name (index_name) based on the search name (index) and adds (outputnew) the field threashold to the results
Line 3 compares the count to the threshold and sets a flag
Line 4 just displays the results

Hope this helps

0 Karma