Splunk Search

Alarm Condition Creation

daniel333
Builder

All,

I have this search which when done displays the ipaddress of people and the number of hits they made against our site. We found that people going over 1000 hits per minute were generally fraud.

index=apache_access_logs host=apache* /myapi/myevent| timechart count by clientip

I'd like the results of that search sent to me when a clienip exceeds 1000 in a minutes time.

How do I loop through the results and run a condution of where > 1000?

Tags (1)
0 Karma

vincesesto
Communicator

Hi daniel333,

If you create a new Alert through the management interface(Manager => Searches and Reports => Add New). It will allow you to set the Alert Condition, where you can choose "if number of events" then "is greater than".

It will step you through all of the process. I hope that this is what you are looking for.

Regards Vince

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...

Auto-Injector for Everything Else: Making OpenTelemetry Truly Universal

You might have seen Splunk’s recent announcement about donating the OpenTelemetry Injector to the ...