Hello All, I'm trying since 3 days now to find a solution for my problem but without success. I look around for solutions and already asked questions but I didn't find (or I missed it) any. I have a monitoring tool that sends me the host problems in splunk in json format. Once the alert/problem ended, the tool send me another message in splunk but with very little informations except of one field that contains a value(alert id) of the initial alert. Here a example: Initial alert: {"timestamp":1662715948,"guid":468431423,"result":1,"eid":1580,"name":"test kouzou","sev":3,"h":[{"host":"toto","name":"toto"}],"team":["titi"],"tags":-[{"tag":"App","value":"System"},{"tag":"App","value":"host-up"}]} Recovery: {"timestamp":1662716608,"guid":604699994,"result":0,"eid":1059134005,"init_eid":1580} The idea is, to make searches for alerts that have not been resolved yet and show them in a dashboard, if the alert has been acknowledged by the tool, I don't want to show it .I'm trying to make equivalency with the "init_eid" and "eid" field but without success. It is a json content and I tried to do some manual extractions in order to guarantee the "normality" of the fields.I realized also that the "transactions" command is not working at all, only for one field. Do you have any ideas on how I could achieve this goal? Thank you in advance.
... View more