Alerting

Alert trigger conditions

danbutterman
Explorer

Hello Splunk community,

I have an alert setup that will trigger when a website status does not equal 200:

index=perfmon host="nameofsearchhead" sourcetype=httpstatus 
| where status!=200 
| lookup Prod-Websites.csv url AS url OUTPUTNEW server
| table _time,url,status

The results in the statistics tab show up as three columns: time, url, status code.

The alert currently triggers whenever I receive more than 4 results (which could be 5 different urls, that had a single non-200 event each).

I would like for the alert to trigger whenever I receive more than 4 results (non-200 events) for a single url, instead.

Tags (1)
0 Karma
1 Solution

somesoni2
Revered Legend

Try like this

Alert search

index=perfmon host="nameofsearchhead" sourcetype=httpstatus 
 | where status!=200 
 | lookup Prod-Websites.csv url AS url OUTPUTNEW server
 | table _time,url,status | eventstats count by url | where count>4

Alert condition

when number of results > 0

View solution in original post

somesoni2
Revered Legend

Try like this

Alert search

index=perfmon host="nameofsearchhead" sourcetype=httpstatus 
 | where status!=200 
 | lookup Prod-Websites.csv url AS url OUTPUTNEW server
 | table _time,url,status | eventstats count by url | where count>4

Alert condition

when number of results > 0

danbutterman
Explorer

Will do!

Thank you, somesoni2!

0 Karma
Get Updates on the Splunk Community!

Prove Your Splunk Prowess at .conf25—No Prereqs Required!

Your Next Big Security Credential: No Prerequisites Needed We know you’ve got the skills, and now, earning the ...

Splunk Observability Cloud's AI Assistant in Action Series: Observability as Code

This is the sixth post in the Splunk Observability Cloud’s AI Assistant in Action series that digs into how to ...

Splunk Answers Content Calendar, July Edition I

Hello Community! Welcome to another month of Community Content Calendar series! For the month of July, we will ...