<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk alert based on HTTP status codes in Security</title>
    <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561495#M15440</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225644"&gt;@Pathik&lt;/a&gt;&amp;nbsp;Can you try this.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your_search&amp;gt; status!=200 OR status!=400 OR status!=401 OR status!=403  
| stats count by status 
| addcoltotals count 
| eventstats max(count) as total 
| eval perc=count/total * 100 
| where perc &amp;gt; 5 AND isnotnull(status) | fields - total&lt;/LI-CODE&gt;</description>
    <pubDate>Fri, 30 Jul 2021 06:00:56 GMT</pubDate>
    <dc:creator>venkatasri</dc:creator>
    <dc:date>2021-07-30T06:00:56Z</dc:date>
    <item>
      <title>How create Splunk alert based on HTTP status codes?</title>
      <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561494#M15439</link>
      <description>&lt;P&gt;After searching various posts around HTTP status codes, ended up posting new question &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to create alert if failures are 5% of total traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My criteria of failure is anything that doesn't match HTTP status code 200, 400, 401, 403&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;
&lt;P&gt;Pathik&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 15:53:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561494#M15439</guid>
      <dc:creator>Pathik</dc:creator>
      <dc:date>2023-01-20T15:53:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk alert based on HTTP status codes</title>
      <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561495#M15440</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225644"&gt;@Pathik&lt;/a&gt;&amp;nbsp;Can you try this.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your_search&amp;gt; status!=200 OR status!=400 OR status!=401 OR status!=403  
| stats count by status 
| addcoltotals count 
| eventstats max(count) as total 
| eval perc=count/total * 100 
| where perc &amp;gt; 5 AND isnotnull(status) | fields - total&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 30 Jul 2021 06:00:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561495#M15440</guid>
      <dc:creator>venkatasri</dc:creator>
      <dc:date>2021-07-30T06:00:56Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk alert based on HTTP status codes</title>
      <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561920#M15447</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/163730"&gt;@venkatasri&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Its not working, applied what you shared. but getting only bad requests. (success count not coming in output at all it seems)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other things to change?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 16:07:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561920#M15447</guid>
      <dc:creator>Pathik</dc:creator>
      <dc:date>2021-08-03T16:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk alert based on HTTP status codes</title>
      <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561923#M15448</link>
      <description>&lt;LI-CODE lang="markup"&gt;&amp;lt;your search&amp;gt;
| eval fail=if(status IN (200,400,401,403),0,1)
| stats count as total sum(fail) as fails
| eval percent=100*fails/total
| where percent&amp;gt;5&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 03 Aug 2021 16:17:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/561923#M15448</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-08-03T16:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk alert based on HTTP status codes</title>
      <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/562529#M15454</link>
      <description>&lt;P&gt;Works like a charm&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;, thanks a ton&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 05:12:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/562529#M15454</guid>
      <dc:creator>Pathik</dc:creator>
      <dc:date>2021-08-09T05:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk alert based on HTTP status codes</title>
      <link>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/627744#M16541</link>
      <description>&lt;P&gt;Hi, can you help on the query if multiple condition needs to be met in the same query?&amp;nbsp;&lt;BR /&gt;Example: status code is 500 and greater than 10% alert should be triggered. also, if status code is 403 and greater than 20% alert should be triggered.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 13:00:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/How-create-Splunk-alert-based-on-HTTP-status-codes/m-p/627744#M16541</guid>
      <dc:creator>vinothkumark</dc:creator>
      <dc:date>2023-01-20T13:00:59Z</dc:date>
    </item>
  </channel>
</rss>

