<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Create alert when volume of logs increases significantly from a particular host in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76564#M1046</link>
    <description>&lt;P&gt;Thanks for you reply. I was really looking at counting the number of logs as opposed to the amount in MB. Is it possible to do that? I did try the example you gave but it didn't give me a value for the MB for some reason.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jun 2013 16:06:25 GMT</pubDate>
    <dc:creator>mbond_illumina</dc:creator>
    <dc:date>2013-06-26T16:06:25Z</dc:date>
    <item>
      <title>Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76562#M1044</link>
      <description>&lt;P&gt;I have a problem with a server that keeps violating the splunk indexing volume for the day as the volume of it's logs increases hugely. I'd like to set an alert so that when a theshold is reached it sends out an alert so I can investigate.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 14:36:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76562#M1044</guid>
      <dc:creator>mbond_illumina</dc:creator>
      <dc:date>2013-06-26T14:36:35Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76563#M1045</link>
      <description>&lt;P&gt;You can use a search such as this to look at volume for a particular host and then create an alert off of the search based on a threshold.  This should look at volume of data in MB from "yourhostname" over the last 2 hours for example.  &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*metrics.log series="&amp;lt;yourhostname&amp;gt;" earliest=-2h | eval MB=kb/1024 | chart sum(MB) by series | sort -sum(MB)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you want something a bit more complex you could look at using a standard deviation calculation similar to this:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/answers/47920/comparing-standard-deviations"&gt;http://splunk-base.splunk.com/answers/47920/comparing-standard-deviations&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 15:34:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76563#M1045</guid>
      <dc:creator>sdaniels</dc:creator>
      <dc:date>2013-06-26T15:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76564#M1046</link>
      <description>&lt;P&gt;Thanks for you reply. I was really looking at counting the number of logs as opposed to the amount in MB. Is it possible to do that? I did try the example you gave but it didn't give me a value for the MB for some reason.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 16:06:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76564#M1046</guid>
      <dc:creator>mbond_illumina</dc:creator>
      <dc:date>2013-06-26T16:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76565#M1047</link>
      <description>&lt;P&gt;You could just do a search on the number of events (not logs) but essentially you have individual events coming in from those logs so it's similar.  Here is an example search that gives me the count of events on one host in the last 2 hours.&lt;/P&gt;

&lt;P&gt;sourcetype="access_combined" host="apache-1.splunk.com" earliest=-2h| stats count&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 18:24:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76565#M1047</guid>
      <dc:creator>sdaniels</dc:creator>
      <dc:date>2013-06-26T18:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76566#M1048</link>
      <description>&lt;P&gt;You could use two approaches, volume of data and number of log entries.&lt;/P&gt;

&lt;P&gt;Volume of data the empirical way:&lt;/P&gt;

&lt;P&gt;earliest=-0d@d host=www* | eval b=len(_raw) | eval MB=b/1024/1024 | stats sum(MB)&lt;/P&gt;

&lt;P&gt;Then alert based on a specific threshold. This may be fast enough to alert on it if you run this every few minutes to give it time to count, especially when it gets later in the day.&lt;/P&gt;

&lt;P&gt;Number of log entries:&lt;/P&gt;

&lt;P&gt;earliest=-0d@d host=www* | stats count&lt;/P&gt;

&lt;P&gt;Then alert on a specific threshold.&lt;/P&gt;

&lt;P&gt;If you want to alert based on rate of change, you get to use the above searches with a timechart instead of stats and do some type of comparison. This gets into funky nested searches and comparisons, possibly even summary indexes to compare previous data to current data etc. That may be overkill for what you want to do, however.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 19:18:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76566#M1048</guid>
      <dc:creator>jtrucks</dc:creator>
      <dc:date>2013-06-26T19:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76567#M1049</link>
      <description>&lt;P&gt;or if you have a laaarge amount of data and don't want to search it unnecessarily, you could probably combine inputlookup/outputlookup with a metadata search in between to append to the lookup...&lt;/P&gt;

&lt;P&gt;Or you can install the Splunk Depolyment Monitor app.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 19:22:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76567#M1049</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-26T19:22:32Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76568#M1050</link>
      <description>&lt;P&gt;Another thing to consider is throttling that machine's logging through syslog or the indexer or a forwarder in the middle.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 19:23:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76568#M1050</guid>
      <dc:creator>jtrucks</dc:creator>
      <dc:date>2013-06-26T19:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76569#M1051</link>
      <description>&lt;P&gt;well. throttling the forwarder will reduce the load on the indexer and conserve license space, but it will fill up queues on the forwarder... not really any better. potential loss of events.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2013 19:58:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76569#M1051</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2013-06-26T19:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76570#M1052</link>
      <description>&lt;P&gt;Thanks to you both for your answers. That works great. However, when I create my alert based on the search, what do I choose for the 'Trigger If' setting? I presume I need to enter a custom condition. Do I enter 'MB &amp;gt; 100?'? If I chose 'No of Results' then wouldn't that just be the number of matched events rather than the Sum(MB)?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2013 11:21:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76570#M1052</guid>
      <dc:creator>mbond_illumina</dc:creator>
      <dc:date>2013-06-27T11:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76571#M1053</link>
      <description>&lt;P&gt;Do saved search like this for better output:&lt;/P&gt;

&lt;P&gt;host=www* | eval b=len(_raw) | eval subMB=b/1024/1024 | stats sum(subMB) as MB&lt;/P&gt;

&lt;P&gt;This way MB is the sum total, not the individual event data. Then set Time Range to:&lt;/P&gt;

&lt;P&gt;Start time: -0d@d     Finish time: now&lt;/P&gt;

&lt;P&gt;Then Alert Condition custom:&lt;/P&gt;

&lt;P&gt;where MB &amp;gt; 100&lt;/P&gt;

&lt;P&gt;I had it send results via email and inline and the result is a table that just has:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;   MB
187.343
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Set the frequency to anything you want, like every 5 minutes or whatever works for you. If it takes more than 60 seconds to complete the search near the end of the day, don't do it every minute.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2013 16:10:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76571#M1053</guid>
      <dc:creator>jtrucks</dc:creator>
      <dc:date>2013-06-27T16:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76572#M1054</link>
      <description>&lt;P&gt;Also, please mark Answered if this works for you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2013 16:14:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76572#M1054</guid>
      <dc:creator>jtrucks</dc:creator>
      <dc:date>2013-06-27T16:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Create alert when volume of logs increases significantly from a particular host</title>
      <link>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76573#M1055</link>
      <description>&lt;P&gt;The second option in my answer earlier shows how to count events, as well.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2013 15:44:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Create-alert-when-volume-of-logs-increases-significantly-from-a/m-p/76573#M1055</guid>
      <dc:creator>jtrucks</dc:creator>
      <dc:date>2013-07-11T15:44:01Z</dc:date>
    </item>
  </channel>
</rss>

