Alerting

How to set an alert for "errorcode=800" spike over X threshold for X minutes"?

cbiraris
Path Finder

I was wondering if it was possible to set up an alert to be something like – If there is a "errorcode=800" spike over X threshold for X minutes, trip the alert.

Like, if it’s a prolonged spike that doesn’t go away or climbs in volume/frequency.  Thought I’d ask if this type of alert is even possible…?

 

Labels (5)
Tags (1)
0 Karma

cbiraris
Path Finder

Spike is like more than 30 errors  and continue increasing for next 5 or more than 5 minutes  

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Create a report which finds what you are looking for (assuming it has already happened) then save this as an alert.

The things you might want to do in your report is count the number of errors in 1 minute buckets over the last 5 minutes. Then determine whether the counts reach the threshold (x). Then count how many of the 5 minute buckets are over the threshold and use this result to trigger the alert if over threshold (y)

index = blah ...
| bin _time span=1m
| stats count(eval(error="800")) as errors by _time
| where error > x
| stats count as minutes
| where minutes > y

 

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...