Trigger alert on a calculated value


My search ends with:


| stats count(Request) as RequestCnt,  count(FailedRequest) FailedRequestCnt

| eval FaildRequestPercentage =  RequestCnt / FailedRequestCnt * 100

How would I specify a trigger for FaildRequestPercentage  > 10?

How would I include: RequestCnt, FailedRequestCnt , and FaildRequestPercentage values in my alert message?

Labels (1)
0 Karma


Have the alert trigger when the number of results is not zero and let the query determine when the alert triggers.

| stats count(Request) as RequestCnt,  count(FailedRequest) FailedRequestCnt
| eval FaildRequestPercentage =  RequestCnt / RequestCnt * 100
| where FaildRequestPercentage > 10
| table RequestCnt RequestCnt FaildRequestPercentage 
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

SplunkTrust | Where Are They Now - Michael Uschmann

The Background Five years ago, Splunk published several videos showcasing members of the SplunkTrust to share ...

Admin Your Splunk Cloud, Your Way

Join us to maximize different techniques to best tune Splunk Cloud. In this Tech Enablement, you will get ...

Cloud Platform | Discontinuing support for TLS version 1.0 and 1.1

Overview Transport Layer Security (TLS) is a security communications protocol that lets two computers, ...