Alerting

Need Help on alerts

praneethlekkala
Path Finder

Hi

I have created an alert which checks the transaction's response time, if the response time is more than 10 mins splunk will send an email alert

Here is the search query:

sourcetype="access_log" host=hostname*
| eval headers=split(_raw," ")
| eval username=mvindex(headers,2)
| eval method=mvindex(headers,5)
| eval Request=mvindex(headers,6)
| eval Status=mvindex(headers,8)
| eval Payload=mvindex(headers,9)
| eval req_time=mvindex(headers,10)
| eval uri=mvindex(headers,11)
| eval Method=replace(method,"\"","")
| eval uri=replace(uri,"\"","")
| eval RequestTime_Minutes = req_time*0.0000166667
| eval Response_Time_in_Minutes= round(RequestTime_Minutes,2) | table Response_Time_in_Minutes host username _time uri Request Status
| search Response_Time_in_Minutes > 10

 

My Question:

I want to exclude 1 particular transaction:

"searchrequest-excel-all-fields"


I do not want the alerts if its the above mentioned transaction since it doesn't affect our app in any way, how do i go about it?

 

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try adding 

AND NOT "searchrequest-excel-all-fields"

to your final search

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Try adding 

AND NOT "searchrequest-excel-all-fields"

to your final search

Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...