Splunk Search

To set an alert if a field doesn't exist in log messages in real time

ssankeneni
Communicator

I'm trying to set up a alert If I don't see a log message with in 15 minutes span of time.
I extracted a filed from the log message but I'm not sure how to check for the field in real time .

The query i tired is

index= "metering" host="vm10190" sourcetype="ping" | rex "Ping response: (?.)" | search PingMessage="*OK" | bucket _time span=15m | stats count by _time host | where count<1

Any help would be greatly appreciated .

Tags (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Create a search that finds your log messages. Then schedule that search and have it send an alert if the event count = 0.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Create a search that finds your log messages. Then schedule that search and have it send an alert if the event count = 0.

---
If this reply helps you, Karma would be appreciated.

ssankeneni
Communicator

Thanks for your answer

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Go to the 'Searches and Reports' manager page and click the New button. Enter your search query in the Search box, start time of '-15m' and end time of 'now'. Check the 'Schedule this search' box. Choose "15 minutes" from the 'Run every' box. Under Condition, choose 'if number of events' and 'is equal to' from the respective drop-downs.

Choose the alert action and save the search.

---
If this reply helps you, Karma would be appreciated.
0 Karma

ssankeneni
Communicator

I do get the results now can you please let me know how to use the eventcount in this case

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Are you sure there were results in the last 15 minutes?

Did you specify the time as 'index= "metering" sourcetype="ping" earliest=-15m | rex "Ping response: (?.)" | search PingMessage=":OK*" ' ?

---
If this reply helps you, Karma would be appreciated.
0 Karma

ssankeneni
Communicator

index= "metering" sourcetype="ping" | rex "Ping response: (?.)" | search PingMessage=":OK*"

this query returns me the results where the ping is ok
but when I add the time it doesn't return any results

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Include 'earliest=-15m' in your search query.

---
If this reply helps you, Karma would be appreciated.
0 Karma

ssankeneni
Communicator

I am not sure how to create a search query to return the results for just last 15 minutes

0 Karma

ssankeneni
Communicator

Yes, It is a saved search but it is incorrect and it is not returning any results

0 Karma

richnavis
Contributor

For alerting, you need to setup a save search and schedule it. Then, you can alert based on the results of the saved search. Is the search above your saved search?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...