<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identify when has appear more than 10 errors in one hour in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Identify-when-has-appear-more-than-10-errors-in-one-hour/m-p/340284#M100905</link>
    <description>&lt;P&gt;Hi, splunkers.&lt;/P&gt;

&lt;P&gt;I need to generate an alert when the count of errors are greater than 10 in one hour. This is easy, but now, I need to do an evolution time chart with the alerts that have occurred. With the data of last one month, I had thought make a timechart with span=1h, but this really does not give the wanted result (because, for example, if we have 5 errors between 12:00 and 13:00, and 7 errors between 13:00 and 14:00 it does not showing error, but it can be error if the 12 errors would be within period of 60 minutes). &lt;/P&gt;

&lt;P&gt;We have same trouble with transaction. If I make a transaction establishing a maxspan of 1h, Splunk would detects the first error event and would search error events for next hour, making that if there are 5 errors in the first time period, and 7 in the next period, it does not recognizing it like there was more than 10 errors in a period of 60 mins. We have tried to use maxevents in transaction instead of maxspan and making a eval the duration of the transaction, but in this case Splunk would make bundles of 10 events, because of this neither is valid to our needed.&lt;/P&gt;

&lt;P&gt;Could you help me?&lt;/P&gt;

&lt;P&gt;Thanks a lot!!!&lt;/P&gt;</description>
    <pubDate>Thu, 14 Dec 2017 13:28:55 GMT</pubDate>
    <dc:creator>nsanchezfernand</dc:creator>
    <dc:date>2017-12-14T13:28:55Z</dc:date>
    <item>
      <title>Identify when has appear more than 10 errors in one hour</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Identify-when-has-appear-more-than-10-errors-in-one-hour/m-p/340284#M100905</link>
      <description>&lt;P&gt;Hi, splunkers.&lt;/P&gt;

&lt;P&gt;I need to generate an alert when the count of errors are greater than 10 in one hour. This is easy, but now, I need to do an evolution time chart with the alerts that have occurred. With the data of last one month, I had thought make a timechart with span=1h, but this really does not give the wanted result (because, for example, if we have 5 errors between 12:00 and 13:00, and 7 errors between 13:00 and 14:00 it does not showing error, but it can be error if the 12 errors would be within period of 60 minutes). &lt;/P&gt;

&lt;P&gt;We have same trouble with transaction. If I make a transaction establishing a maxspan of 1h, Splunk would detects the first error event and would search error events for next hour, making that if there are 5 errors in the first time period, and 7 in the next period, it does not recognizing it like there was more than 10 errors in a period of 60 mins. We have tried to use maxevents in transaction instead of maxspan and making a eval the duration of the transaction, but in this case Splunk would make bundles of 10 events, because of this neither is valid to our needed.&lt;/P&gt;

&lt;P&gt;Could you help me?&lt;/P&gt;

&lt;P&gt;Thanks a lot!!!&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 13:28:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Identify-when-has-appear-more-than-10-errors-in-one-hour/m-p/340284#M100905</guid>
      <dc:creator>nsanchezfernand</dc:creator>
      <dc:date>2017-12-14T13:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Identify when has appear more than 10 errors in one hour</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Identify-when-has-appear-more-than-10-errors-in-one-hour/m-p/340285#M100906</link>
      <description>&lt;P&gt;Start with the solution here, to collect and mark all the events you want.  Obviously, you will change the conditions to be &lt;CODE&gt;60m&lt;/CODE&gt; and specify the events you want to portray... &lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/597583/count-something-with-a-specifc-rule-and-time.html#answer-597274"&gt;https://answers.splunk.com/answers/597583/count-something-with-a-specifc-rule-and-time.html#answer-597274&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Do the optional thing at the end to mark all the individual events, then drop all the ones that are not marked.&lt;/P&gt;

&lt;P&gt;This gives you events that you can just drop straight into &lt;CODE&gt;timechart&lt;/CODE&gt; and let it do its thing.  &lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2017 21:36:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Identify-when-has-appear-more-than-10-errors-in-one-hour/m-p/340285#M100906</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-12-14T21:36:48Z</dc:date>
    </item>
  </channel>
</rss>

