Alerting

How to set up an alert based on a threshold which is dynamically updated based on the previous day's maximum value? Thanks!!

bhavik175
New Member

I am trying to create an alert to monitor counts on a per hour basis. I would like to set up a dynamic threshold based on the previous day's maximum value + 20% of the max value. Is there a way we can do this in splunk?

0 Karma

woodcock
Esteemed Legend

Try this:

MySearchStr earliest=-1d@d latest=0d@d | stats max(MyField) AS yesterdayMax | map search="MySearchStr | where MyField>$yesterdayMax$"

0 Karma

HattrickNZ
Motivator

If i run this will I get a value fof zero or 1 in the visualisation tab?
Is $yesterdayMax$ a variable from the 1st part of the search?

I tried to runt it a couple of times, different ways and I was getting no results found

0 Karma

somesoni2
Revered Legend

You want to check the count every hour and compare the count for current hour with 1.2 times max count per hour from yesterday?

0 Karma
Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...