Splunk Search

eval alerting on matching fields.

sbattista09
Contributor

i want to make an alert that will pop when two values in a event match.

index=foo_index  sourcetype=foofoo_prod| eval match=if(field1_foo==Filed2_foo,1,0)

The issues I am not sure of what eval function to use. 😞

0 Karma

saurabhkharkar
Path Finder

the if statement will return 1 if the fields match else it will return 0

| eval match=if(field1_foo==field2_foo,1,0)
| where match=1

If you want to set an alert - save the search where 'match=1' (to get events where the fields are same) as an alert where you can schedule it to run periodically or create a correlation search in Splunk ES to create a notable event.

0 Karma
Get Updates on the Splunk Community!

Good Sourcetype Naming

When it comes to getting data in, one of the earliest decisions made is what to use as a sourcetype. Often, ...

See your relevant APM services, dashboards, and alerts in one place with the updated ...

As a Splunk Observability user, you have a lot of data you have to manage, prioritize, and troubleshoot on a ...

Splunk App for Anomaly Detection End of Life Announcement

Q: What is happening to the Splunk App for Anomaly Detection?A: Splunk is officially announcing the ...