Splunk Search

eval alerting on matching fields.

sbattista09
Contributor

i want to make an alert that will pop when two values in a event match.

index=foo_index  sourcetype=foofoo_prod| eval match=if(field1_foo==Filed2_foo,1,0)

The issues I am not sure of what eval function to use. 😞

0 Karma

saurabhkharkar
Path Finder

the if statement will return 1 if the fields match else it will return 0

| eval match=if(field1_foo==field2_foo,1,0)
| where match=1

If you want to set an alert - save the search where 'match=1' (to get events where the fields are same) as an alert where you can schedule it to run periodically or create a correlation search in Splunk ES to create a notable event.

0 Karma
Get Updates on the Splunk Community!

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...

Index This | What goes away as soon as you talk about it?

May 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this month’s ...

What's New in Splunk Observability Cloud and Splunk AppDynamics - May 2025

This month, we’re delivering several new innovations in Splunk Observability Cloud and Splunk AppDynamics ...