<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert for high amount of events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635253#M220704</link>
    <description>&lt;P&gt;I tuning a bit, but BIG thanks for the concept!&lt;/P&gt;&lt;P&gt;index=_internal source="*metrics.log" eps "group=per_source_thruput" NOT filetracker | eval events=eps*kb/kbps&lt;BR /&gt;| timechart fixedrange=t span=1m limit=5 sum(events) by series&lt;BR /&gt;| untable _time series count&lt;BR /&gt;| sort _time 0 series&lt;BR /&gt;| streamstats current=t time_window=5m count(eval(count&amp;gt;X)) as rollingHighCount by series&lt;BR /&gt;| where rollingHighCount=5&lt;/P&gt;</description>
    <pubDate>Tue, 21 Mar 2023 08:44:06 GMT</pubDate>
    <dc:creator>norbertt911</dc:creator>
    <dc:date>2023-03-21T08:44:06Z</dc:date>
    <item>
      <title>How to set an alert for high amount of events?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635137#M220668</link>
      <description>&lt;P&gt;Hello Splunkers,&lt;/P&gt;
&lt;P&gt;I would like to have to set an alert if a sudden high amount of events are received.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have this base search:&lt;/P&gt;
&lt;P&gt;index=_internal source="*metrics.log" eps "group=per_source_thruput" NOT filetracker | eval events=eps*kb/kbps&lt;BR /&gt;| timechart fixedrange=t span=1m limit=5 sum(events) by series&lt;/P&gt;
&lt;P&gt;So I have the number of events by a source per minute.&amp;nbsp; I like to trigger an alert if there are more than X events in 5 consecutive minutes from one source.&lt;/P&gt;
&lt;P&gt;Thanks for your hints in advance&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 21:59:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635137#M220668</guid>
      <dc:creator>norbertt911</dc:creator>
      <dc:date>2023-03-20T21:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635154#M220674</link>
      <description>&lt;P&gt;Based on your search, schedule your report to run every minute using earliest=-5m@m and latest=@m&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| bin _time span=1m
| stats sum(events) as events by _time series
| where events &amp;gt; X
| stats count by series
| where count == 5&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 20 Mar 2023 15:08:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635154#M220674</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-03-20T15:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635159#M220677</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This returns with a strange result. (If I do not remove the | timechart... line from the original search, there is no result.) But, then the result somehow not including my firewalls, where the event per minute is over 100000...&lt;/P&gt;&lt;P&gt;Running this every 5 minutes will show the "top list" of the series in that five minutes, but I really looking for the peaks. Running my original search every 3 hours will show the peaks pretty well:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="norbertt911_0-1679326501773.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/24382i20784AC9CAA8F9AE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="norbertt911_0-1679326501773.png" alt="norbertt911_0-1679326501773.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;But I want to have an email alert in case the events per minute go over a limit. For example, if the "normal" is 100000/min, but then it goes up 250000/min and then back to 100000/min that's OK I do not want to have an alert. But if it stays on the 250000/min level (that is set as X) for more than 5 minutes continuously, I would like to have the alert. ( and I check the behavior later)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 15:45:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635159#M220677</guid>
      <dc:creator>norbertt911</dc:creator>
      <dc:date>2023-03-20T15:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635162#M220678</link>
      <description>&lt;P&gt;"Strange" while colourful is not particularly descriptive. Without knowledge of your events, and based on what you appear to have been using e.g. events holds some sort of count, summing those counts every minute for the past 5 minutes (by series - whatever that is from your events) would give you totals for each of the 5 minutes. By counting the number of stats events with totals above your threshold would give you the number of minutes each series breached your threshold in the last 5 minutes. Is this not what you were trying to find out? If not, please provide example events and/or a clearer explanation of what you have tried, what you got as a result, and why it is not what you were after.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 16:05:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635162#M220678</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-03-20T16:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635199#M220692</link>
      <description>&lt;P&gt;Try something like this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal source="*metrics.log" eps "group=per_source_thruput" NOT filetracker | eval events=eps*kb/kbps
| timechart fixedrange=t span=1m limit=5 sum(events) by series 
| untable _time series count 
| sort 0 series _time
| streamstats current=t window=5 count(eval(count&amp;gt;X)) as rollingHighCount by series 
| where rollingHighCount=5&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;Replace the X in streamstats command with your number.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 20:14:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635199#M220692</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2023-03-20T20:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635207#M220693</link>
      <description>&lt;P&gt;I mean with the "strange", that your search returns totally different results than my search &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;My goal is: to monitor the number of events per series per minute - the flow itself.&amp;nbsp; On top of that if there is a&amp;nbsp; peak, like 3-4x more events per minute than usual for a longer period (5-10 minutes), raise an alert. This suddenly increased traffic on network devices/firewalls could be a good indicator of an attack or some issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 21:22:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635207#M220693</guid>
      <dc:creator>norbertt911</dc:creator>
      <dc:date>2023-03-20T21:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635219#M220695</link>
      <description>&lt;P&gt;Apart from counting per minute and then counting how many minutes are over the threshold, you could look at the Machine Learning ToolKit (MLTK) from SplunkBase, which is quite good for building models of normal patterns and detecting anomalies - which is essentially what you are trying to do.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 23:04:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635219#M220695</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-03-20T23:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for high amount of events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635253#M220704</link>
      <description>&lt;P&gt;I tuning a bit, but BIG thanks for the concept!&lt;/P&gt;&lt;P&gt;index=_internal source="*metrics.log" eps "group=per_source_thruput" NOT filetracker | eval events=eps*kb/kbps&lt;BR /&gt;| timechart fixedrange=t span=1m limit=5 sum(events) by series&lt;BR /&gt;| untable _time series count&lt;BR /&gt;| sort _time 0 series&lt;BR /&gt;| streamstats current=t time_window=5m count(eval(count&amp;gt;X)) as rollingHighCount by series&lt;BR /&gt;| where rollingHighCount=5&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2023 08:44:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-set-an-alert-for-high-amount-of-events/m-p/635253#M220704</guid>
      <dc:creator>norbertt911</dc:creator>
      <dc:date>2023-03-21T08:44:06Z</dc:date>
    </item>
  </channel>
</rss>

