Splunk Search

searching changes in the specified field

rsathish47
Contributor

Hi All,

I have search which runs every four hours collecting the mailbox details. i need to alert or notify if any change in the specified field

Event @ 0
MailboxA CA=1 CA2=3
.
.
MailboxZ CA=2 CA2=3

Event @ 4
MailboxA CA=3 CA2=3
.
.
MailboxZ CA=2 CA2=3

Answer:

MailboxA changed CA1 vlaued 1 to 3

Please let me know how to perform this

Tags (1)
0 Karma
1 Solution

MuS
SplunkTrust
SplunkTrust

Hi rsathish47,

try something like this:

YourBaseSearchHere | streamstats current=f last(CA) as last_CA by Mailbox | where CA!=last_CA | ...

this assumes that you have a mailbox field extracted that represents MailboxA and/or MailboxZ

hops the helps to get you started ...

cheers, MuS

View solution in original post

MuS
SplunkTrust
SplunkTrust

Hi rsathish47,

try something like this:

YourBaseSearchHere | streamstats current=f last(CA) as last_CA by Mailbox | where CA!=last_CA | ...

this assumes that you have a mailbox field extracted that represents MailboxA and/or MailboxZ

hops the helps to get you started ...

cheers, MuS

rsathish47
Contributor

Thanks Buddy .. it works 🙂 🙂

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...