Alerting

Linux TOP load average

juliedba
Observer

Hi, I am a Splunk newbie, I am attempting to create an alert that will notify if loadAvg1mi is sustained above 20 for more than one hour.  

This is how I started:

index =os host=myserver sourcetype =vmstat loadAvg1mi |where loadAvg1mi>20 | timechart avg(loadAvg1mi)

But I have no idea how to add the sustained over 1 hour.

Any ideas would be apprecieated.

Thanks

Labels (1)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @juliedba,

It think your loadAvg1mi logs are coming every minutes. After filtering the values that above 20, you can use count per hour. Please try below sample for all your hosts;

index=os sourcetype=vmstat loadAvg1mi 
| where loadAvg1mi>20 
| timechart span=1h count(loadAvg1mi) as count by host
| where count > 60

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...