Alerting

Trigger alert on a calculated value

wlbaird
Engager

My search ends with:

...

| stats count(Request) as RequestCnt,  count(FailedRequest) FailedRequestCnt

| eval FaildRequestPercentage =  RequestCnt / FailedRequestCnt * 100

How would I specify a trigger for FaildRequestPercentage  > 10?

How would I include: RequestCnt, FailedRequestCnt , and FaildRequestPercentage values in my alert message?

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Have the alert trigger when the number of results is not zero and let the query determine when the alert triggers.

...
| stats count(Request) as RequestCnt,  count(FailedRequest) FailedRequestCnt
| eval FaildRequestPercentage =  RequestCnt / RequestCnt * 100
| where FaildRequestPercentage > 10
| table RequestCnt RequestCnt FaildRequestPercentage 
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...