Alerting

How to set up an alert based on a threshold which is dynamically updated based on the previous day's maximum value? Thanks!!

bhavik175
New Member

I am trying to create an alert to monitor counts on a per hour basis. I would like to set up a dynamic threshold based on the previous day's maximum value + 20% of the max value. Is there a way we can do this in splunk?

0 Karma

woodcock
Esteemed Legend

Try this:

MySearchStr earliest=-1d@d latest=0d@d | stats max(MyField) AS yesterdayMax | map search="MySearchStr | where MyField>$yesterdayMax$"

0 Karma

HattrickNZ
Motivator

If i run this will I get a value fof zero or 1 in the visualisation tab?
Is $yesterdayMax$ a variable from the 1st part of the search?

I tried to runt it a couple of times, different ways and I was getting no results found

0 Karma

somesoni2
Revered Legend

You want to check the count every hour and compare the count for current hour with 1.2 times max count per hour from yesterday?

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...