Splunk Search

Can you help me with a query I have for an alert?

naomibn
Explorer

Hello experts,

I am new to Splunk. I have a file with below values. I have Indexed time as well. I need to write a query to alert for if any id has text=started and consequent 2 other texts ( it can be anything) for the same id in < 5 minutes.

id text
123 started
123 in progress
123 halted
213 started
213 finished
456 started
456 running
456 in progress

Kindly help.

I tried:

index=test  text="started" |stats count by id. But that is showing only the started ones and does not have the other texts . The other texts are random so cannot specify in a search.

Thanks a lot,

Cheers,
Naomi

0 Karma

HiroshiSatoh
Champion

Is this search helpful?

 (your search)
| transaction id maxspan=5m startswith="started"
| where eventcount>2
0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...