Alerting

How to set up an index search alert based on a hourly record count that exceeds a certain threshold?

Raf001
New Member

Hi all, just wanted to ask the best practice approach for my requirement.

Currently I have a real-time search which populates a simple chart. It simply displays a count of error records from an error log table in our database grouped in hourly buckets.

I'm using a search like | bucket _time span=1h | stats count by _time |

Now I also need to create an alert which will send an email if an error count in an hourly grouping exceeds a fixed value, e.g. 50

My initial thought is to simply set up an hourly schedule to count the number of records directly from the Error log table and if the count exceeds 50 then trigger the alert, but I'm sure there is a better and more robust way of doing this. Would appreciate any suggestions.

Many thanks in advance!

0 Karma

stephanefotso
Motivator

Here you go.

Run this search and save it as an Alert: ... | stats count

  • Alert Name: Errors_Alert
  • Alert Type: RealTime
  • Trigger condition : custom
  • custom condition: count>50
  • in 1 hour
  • .......

Thanks

SGF
0 Karma
Get Updates on the Splunk Community!

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...