Splunk Enterprise Security

calculations on events for daily alert


Hi team,

I need to create a alert, where if my daily count is less than 30 % of monthly count average... of a particular field

how is this..

Labels (1)
0 Karma


This should get you started.

index=foo earliest=-30d 
| bucket span=1d _time 
| stats count by _time 
| stats avg(count) as MonthlyAvg, latest(count) as Today 
| eval limit=MonthlyAvg*0.30
| where Today < limit
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Splunk Training for All: Meet Aspiring Cybersecurity Analyst, Marc Alicea

Splunk Education believes in the value of training and certification in today’s rapidly-changing data-driven ...

The Splunk Success Framework: Your Guide to Successful Splunk Implementations

Splunk Lantern is a customer success center that provides advice from Splunk experts on valuable data ...

Investigate Security and Threat Detection with VirusTotal and Splunk Integration

As security threats and their complexities surge, security analysts deal with increased challenges and ...