Splunk Search

Splunk Alert

sshanmua
New Member


I am trying to create a Splunk alert where the log line is delimited with comma,
I need to get the field 4 and check if the value is greater than threshold then raise an alert 

 

I am able to search the field from corresponding file but unable to fetch the uniq filed and please help with getting the corresponding field which is delimit with comma > threshold

log: when i search for ,dat1,  it get me both the lines 
date,dat1,queue,0,100,0,0,0,0
date,am.dat1,queue,10000,23,34,0,0

index=index host="hostname" source="logpath" dat1

 

 

 

 

Labels (5)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @sshanmua,

if you already extracted field4, it's very easy to run a search to use in an alert:

index=index host="hostname" source="logpath" dat1
| where field4>10000

where 1000 is the theshold.

If instead you didn't extracted the field4, you have to extract it using a regex:

index=index host="hostname" source="logpath" dat1
| rex "^[^,]+,[^,]+,[^,]+,(?<field4>\d+)"
| where field4>10000

regex that you can check at https://regex101.com/r/YLI5KN/1

Ciao.

Giuseppe

 

0 Karma

sshanmua
New Member

Sorry for asking more what is the syntax for selecting field 2 and field 5 

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @sshanmua,

you can extract all the fields or only some of them using a similar regex, this is for fields 2, 4 and 5, as you requested:

| rex "^[^,]+,(?<field2>[^,]+),[^,]+,(?<field4>\d+),(?<field5>\d+)"

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...