Alerting

Alert Query

FayazAhmed
New Member

Hi,

I have to search the string below
Error Code : 5010 | Barcodes {X}
X is some value, and it can be change frequently, I need to raise an alert when one barcode is repeating twice and not raising the alert for same barcode throughout a day.
What should be my search, and how can I display for which barcode I have raised the alert.
Thanks in Advance

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

You can find duplicate barcodes using a query like this one.

<your search for barcodes> earliest=@d | stats count by Barcodes | where count > 1

Prevent multiple alerts by using the Throttle option in the alert configuration.

---
If this reply helps you, Karma would be appreciated.
0 Karma

kamlesh_vaghela
SplunkTrust
SplunkTrust

@FayazAhmed

I think you query should be like below.

index=your_index "Error Code : 5010" Barcodes=* | stats count by Barcodes  |where count=2

OR

if your events have Error_Code field then

index=your_index Error_Code=5010 Barcodes=* | stats count by Barcodes  |where count=2

Create an alert using any of above search. Use below link to create search.

https://docs.splunk.com/Documentation/Splunk/7.2.3/Alert/Alertexamples

for not raising the alert for same barcode throughout a day, you have to set Throttle with field=Barcodes and Throttle period is 1 day.

https://docs.splunk.com/Documentation/Splunk/7.2.3/Alert/Alertexamples#Throttle_the_real-time_alert

Thanks

0 Karma

FayazAhmed
New Member

Hi @kamlesh_vaghela

Thank you for the help,

The search didn't help my query

My log snippet looks like below
Error Code : 5010 | Barcodes 000323334011 |
if the above mentioned Barcode is repeating twice then I should raise an alert,

The barcode can change frequently.

Can you please suggest.

0 Karma

DMohn
Motivator

Given you have not extracted your fields yet you could try it like this:

 <base search> | rex field=_raw "Error\sCode\s:\s(?<error_code>[\d]+)\s\|\sBarcodes\s\{(?<barcodes>[^\}]+)" | where error_code=5010 | stats count by barcodes | where count > 1

Save the search as an alert and set the trigger condition to number of results greater than 0, and alert for each result, activate throtteling and set the throttle period to 1 day.

Then you may add any desired alert action.

0 Karma

FayazAhmed
New Member

@DMohn
Thank you very much the reply
My log snippet looks like below
Error Code : 5010 | Barcodes 000323334011 |
if the above mentioned Barcode is repeating twice then I should raise an alert,

The barcode can change frequently.

Can you please suggest.

0 Karma

DMohn
Motivator

@FayazAhmed Please use the following search:

 <base search> | rex field=_raw "Error\sCode\s\:\s(?<error_code>[\d]+)\s\|\sBarcodes\s(?<barcodes>[\d]+)\s" | where error_code=2010 | stats count by barcodes | where count > 1 | table barcodes

It should do exactly what you want. Just replace the <base search> part with a search that shows your desired logs (like index=mylogs sourcetype=barcode_errors or similar).

Then use the "Save as" link in the right top above the search bar, save as Alert, set a schedule time as desired, set the trigger condition to "number of results" greater than 0, set to alert for each result, and set throtteling to 1 day.

Happy Splunking!

0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...