Splunk Search

Combining multiple searches

anirbanukil
Explorer

I have three different (unique) searches which sends out alerts in case certain conditions are met. I want to send an alert if all the three alerts (as mentioned above) are fired for an escalation scenario. Please advice how this can be achieved.

Tags (3)
0 Karma
1 Solution

imrago
Contributor

Perhaps you could create an alert which would search for those three alerts in

index="_audit" action="alert_fired"

View solution in original post

imrago
Contributor

Perhaps you could create an alert which would search for those three alerts in

index="_audit" action="alert_fired"

imrago
Contributor

index=_audit action="alert_fired" ss_name=Alert1 OR ss_name=Alert2 OR ss_name=Alert3 | stats dc(ss_name) as alerts

and you should fire the alert if alerts = 3

0 Karma

anirbanukil
Explorer

Thanks for the update but how can I search multiple alert names as an 'AND' condition.
Ex: Alert1 and Alert2 and Alert3 all have fired.

0 Karma
Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...