Splunk Enterprise Security

calculations on events for daily alert

punithjigali
Explorer

Hi team,

I need to create a alert, where if my daily count is less than 30 % of monthly count average... of a particular field

how is this..

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

This should get you started.

index=foo earliest=-30d 
| bucket span=1d _time 
| stats count by _time 
| stats avg(count) as MonthlyAvg, latest(count) as Today 
| eval limit=MonthlyAvg*0.30
| where Today < limit
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...