Alerting

Need Help on alerts

praneethlekkala
Path Finder

Hi

I have created an alert which checks the transaction's response time, if the response time is more than 10 mins splunk will send an email alert

Here is the search query:

sourcetype="access_log" host=hostname*
| eval headers=split(_raw," ")
| eval username=mvindex(headers,2)
| eval method=mvindex(headers,5)
| eval Request=mvindex(headers,6)
| eval Status=mvindex(headers,8)
| eval Payload=mvindex(headers,9)
| eval req_time=mvindex(headers,10)
| eval uri=mvindex(headers,11)
| eval Method=replace(method,"\"","")
| eval uri=replace(uri,"\"","")
| eval RequestTime_Minutes = req_time*0.0000166667
| eval Response_Time_in_Minutes= round(RequestTime_Minutes,2) | table Response_Time_in_Minutes host username _time uri Request Status
| search Response_Time_in_Minutes > 10

 

My Question:

I want to exclude 1 particular transaction:

"searchrequest-excel-all-fields"


I do not want the alerts if its the above mentioned transaction since it doesn't affect our app in any way, how do i go about it?

 

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try adding 

AND NOT "searchrequest-excel-all-fields"

to your final search

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Try adding 

AND NOT "searchrequest-excel-all-fields"

to your final search

Get Updates on the Splunk Community!

The OpenTelemetry Certified Associate (OTCA) Exam

What’s this OTCA exam? The Linux Foundation offers the OpenTelemetry Certified Associate (OTCA) credential to ...

From Manual to Agentic: Level Up Your SOC at Cisco Live

Welcome to the Era of the Agentic SOC   Are you tired of being a manual alert responder? The security ...

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...