Alerting

alert

vinod_52791
Engager

I want to send an alert when  response time > 10 sec is more than 2% of total transaction in an hour
could you please suggest proper query to achieve the above requirement.

Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval slow=if(response>10,1,0)
| bin _time span=1h
| stats count sum(slow) as slow by _time
| eval tooslow=100*slow/count
| where tooslow>2
0 Karma

vinod_52791
Engager

HI @ITWhisperer 

i want it as 10000 milliseconds
then how the query will be??

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Is your response field in milliseconds?

0 Karma

vinod_52791
Engager

hi @ITWhisperer 

 

Yes field in milliseconds

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval slow=if(response>10000,1,0)
| bin _time span=1h
| stats count sum(slow) as slow by _time
| eval tooslow=100*slow/count
| where tooslow>2
0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...