Splunk Search

How to set up an alert to send an email with the output of another search?

kmasood
Explorer

I have an alert that sends emails when process count goes above a certain level. When these conditions are met, I would like Splunk to send an email with the output of another search command. For e.g.,

Alert search (already works):

index="os" host="host1*" sourcetype="top" COMMAND="httpd" | stats count

Follow-up search (run if previous alert's conditions are met):

index="apps" host="host1*" sourcetype="access*" | stats count(uri) by clientip,uri

How does one configure such (cascading?) alerts?

0 Karma

somesoni2
Revered Legend

Try this.
Change the search of your current alert search to this and change the alert condition to "when number of greater than 0" . THis search will return events only if the where conditions are met.

 index="os" host="host1*" sourcetype="top" COMMAND="httpd" | stats count | where count > YOURLIMIT| map search="search      index="apps" host="host1*" sourcetype="access*" | stats count(uri) by clientip,uri"

kmasood
Explorer

That looks great, could you add a little bit of explanation of how this uses the map command? I'm not sure I understand "Looping operator, performs a search over each search result." from the docs.

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...