Alerting

alert

vinod_52791
Engager

I want to send an alert when  response time > 10 sec is more than 2% of total transaction in an hour
could you please suggest proper query to achieve the above requirement.

Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval slow=if(response>10,1,0)
| bin _time span=1h
| stats count sum(slow) as slow by _time
| eval tooslow=100*slow/count
| where tooslow>2
0 Karma

vinod_52791
Engager

HI @ITWhisperer 

i want it as 10000 milliseconds
then how the query will be??

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Is your response field in milliseconds?

0 Karma

vinod_52791
Engager

hi @ITWhisperer 

 

Yes field in milliseconds

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval slow=if(response>10000,1,0)
| bin _time span=1h
| stats count sum(slow) as slow by _time
| eval tooslow=100*slow/count
| where tooslow>2
0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...