Splunk Search

where clause over row

bic
Explorer

I have the below query which gives me the count of alerts over period of an hour, I wanted to make it as an alert by adding a where clause and display only those host names whose value is more than 4 in the given time period of 1 hour

index="mail" alert_type="Danger" | eval firsttime=strptime(time_triggered, "%m/%d/%y %H:%M:%S") | eval hour=strftime(firsttime,"%H") | chart count(host_info) as count_of_host by hour host_info | fields - NULL

This gives below result

hour Host1 Host2
04 1 4
10 1 3

The result I want is

hour Host2
04 4

Also time_triggered is not same as _time.
Please help.

0 Karma
1 Solution

knielsen
Contributor

I think instead of your "... | chart ..." you should do:

<your base search with strptime stuff and eval hour> | stats count(host_info) as count by hour, host_info | where count>=4 | xyseries hour host_info count

Hth,
-Kai.

View solution in original post

knielsen
Contributor

I think instead of your "... | chart ..." you should do:

<your base search with strptime stuff and eval hour> | stats count(host_info) as count by hour, host_info | where count>=4 | xyseries hour host_info count

Hth,
-Kai.

Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...