Alerting

Splunk Alert Setup

csridhar
New Member

Hello Everyone,

I need a help in setting up Splunk Alert to generate an alert if we get 60 errors per minute over a 5 minute period

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Perhaps this will get you started.

index=foo earliest=-5m ERROR
```Group events by the minute```
| bin span=1m _time
```Count how many occurred each minute```
| stats count by _time
```Keep only the minutes where the count was 60
| where count=60
```Count how many minutes are represented```
| stats count
```Return results if all 5 minutes have 60 errors```
| where count=5
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...

Auto-Injector for Everything Else: Making OpenTelemetry Truly Universal

You might have seen Splunk’s recent announcement about donating the OpenTelemetry Injector to the ...