Alerting

Linux TOP load average

juliedba
Observer

Hi, I am a Splunk newbie, I am attempting to create an alert that will notify if loadAvg1mi is sustained above 20 for more than one hour.  

This is how I started:

index =os host=myserver sourcetype =vmstat loadAvg1mi |where loadAvg1mi>20 | timechart avg(loadAvg1mi)

But I have no idea how to add the sustained over 1 hour.

Any ideas would be apprecieated.

Thanks

Labels (1)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @juliedba,

It think your loadAvg1mi logs are coming every minutes. After filtering the values that above 20, you can use count per hour. Please try below sample for all your hosts;

index=os sourcetype=vmstat loadAvg1mi 
| where loadAvg1mi>20 
| timechart span=1h count(loadAvg1mi) as count by host
| where count > 60

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...

Purpose in Action: How Splunk Is Helping Power an Inclusive Future for All

At Cisco, purpose isn’t a tagline—it’s a commitment. Cisco’s FY25 Purpose Report outlines how the company is ...

[Upcoming Webinar] Demo Day: Transforming IT Operations with Splunk

Join us for a live Demo Day at the Cisco Store on January 21st 10:00am - 11:00am PST In the fast-paced world ...