Alerting

alert when search value not found for 30 min.

raindrop18
Communicator

I have set alert when the expected keyword missing from the log for 30 min. but I didn't get any alert I am wondering what I have missed. so the objective is if "customerID AND status 200" not found on the log for last 30 min to send me alert.

index=trans attributeName="CustomerID" AND "[status=200]" | head 1 | eval age = now() - _time

start time = -30m@m

Finish time = NOW
run every = 30minute
condition = if custom condition met
custom condition search = where age > 1800

Tags (2)
0 Karma

somesoni2
Revered Legend

When the conditions are not met for 30 mins, you alert search will not return any records hence no age calculation can take place.

You can achieve this in two ways

1) Check the age of last event which met condition and raise alert if the age is more than 30 minutes

index=trans attributeName="CustomerID" AND "[status=200]" | head 1 | eval age = now() - _time

start time = -60m@m
Finish time = now
run every = 30minute
condition = if custom condition met
custom condition search = where age > 1800

2) Check if any event present meeting that condition in last 30 min and if no event raise alert

index=trans attributeName="CustomerID" AND "[status=200]" | head 1 

start time = -30m@m
Finish time = NOW
run every = 30minute
condition = if number of events is greater than 0

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...