Alerting

Alert when Avg duration greater than threshold

sivaranjani
Explorer

I have a query that displays avg duration. How to i modify query to alert if avg ( duration) is greater than 1000 last 15 mins. 

index=tra cf_space_name="pr" "cf_app_name":"Sch" "msg"."Logging Duration" AND NOT "DistributedLockProcessor" |rename msg.DurationMs as TimeT |table _time TimeT msg.Service
| bucket _time span=1m
| stats
avg(TimeT) as "Avg"
by msg.Service

11.JPG

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Use your search in an alert and add the following

| where Avg > 1000

Then set the timeframe for the search to be last 15 minutes and the alert trigger to be when there are greater than zero results

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...