Alerting

How to set an alert for "errorcode=800" spike over X threshold for X minutes"?

cbiraris
Path Finder

I was wondering if it was possible to set up an alert to be something like – If there is a "errorcode=800" spike over X threshold for X minutes, trip the alert.

Like, if it’s a prolonged spike that doesn’t go away or climbs in volume/frequency.  Thought I’d ask if this type of alert is even possible…?

 

Labels (5)
Tags (1)
0 Karma

cbiraris
Path Finder

Spike is like more than 30 errors  and continue increasing for next 5 or more than 5 minutes  

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Create a report which finds what you are looking for (assuming it has already happened) then save this as an alert.

The things you might want to do in your report is count the number of errors in 1 minute buckets over the last 5 minutes. Then determine whether the counts reach the threshold (x). Then count how many of the 5 minute buckets are over the threshold and use this result to trigger the alert if over threshold (y)

index = blah ...
| bin _time span=1m
| stats count(eval(error="800")) as errors by _time
| where error > x
| stats count as minutes
| where minutes > y

 

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...