Alerting

alert

vinod_52791
Engager

I want to send an alert when  response time > 10 sec is more than 2% of total transaction in an hour
could you please suggest proper query to achieve the above requirement.

Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval slow=if(response>10,1,0)
| bin _time span=1h
| stats count sum(slow) as slow by _time
| eval tooslow=100*slow/count
| where tooslow>2
0 Karma

vinod_52791
Engager

HI @ITWhisperer 

i want it as 10000 milliseconds
then how the query will be??

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Is your response field in milliseconds?

0 Karma

vinod_52791
Engager

hi @ITWhisperer 

 

Yes field in milliseconds

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval slow=if(response>10000,1,0)
| bin _time span=1h
| stats count sum(slow) as slow by _time
| eval tooslow=100*slow/count
| where tooslow>2
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

How to find the worst searches in your Splunk environment and how to fix them

Everyone knows Splunk is a powerful platform for running searches and doing data analytics. Your ...

Share Your Feedback: On Admin Config Service (ACS)!

Help Us Build a Better Admin Config Service Experience (ACS)   We Want Your Feedback on Admin Config Service ...