Alerting

How to create an alert based on the threshold condition?

navd
New Member

search query is:

index="confiacd" | stats avg(responsetime)

Now I want to setup an alert when the avg(responsetime) > 500 , so where do i write this condition to setup alert.

0 Karma
1 Solution

kmaron
Motivator

Put the condition in the query:

index="confiacd" | stats avg(responsetime)  as average_response | where average_response > 500

Then in your alert definition set your Trigger Condition to Number of Results > 0

View solution in original post

0 Karma

s-Lope678
Observer

What does your "500" threshold mean here? 

0 Karma

kmaron
Motivator

Put the condition in the query:

index="confiacd" | stats avg(responsetime)  as average_response | where average_response > 500

Then in your alert definition set your Trigger Condition to Number of Results > 0

0 Karma
Get Updates on the Splunk Community!

Splunk is Nurturing Tomorrow’s Cybersecurity Leaders Today

Meet Carol Wright. She leads the Splunk Academic Alliance program at Splunk. The Splunk Academic Alliance ...

Part 2: A Guide to Maximizing Splunk IT Service Intelligence

Welcome to the second segment of our guide. In Part 1, we covered the essentials of getting started with ITSI ...

Part 1: A Guide to Maximizing Splunk IT Service Intelligence

As modern IT environments continue to grow in complexity and speed, the ability to efficiently manage and ...