Splunk Search

what is the syntax of the custom condition search

alexl1
Path Finder

hi

what is the syntax of the custom condition search

I have a search like

earliest=-5m  heartbeat | stats count

I want it to run a script when count=0

I tried "if custom condition is met" then for value I put "|where count=0"

but the alert triggered even though count was one

I can't find the documentatino about "if custom condition is met" otherwise I would have looked there

thanks,

Tags (1)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

Set up your alert like this:

[your alert]
...
alert_condition = where count=0
counttype = custom
...
search = earliest=-5m heartbeat | stats count
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...