Splunk Search

Alarm Condition Creation

daniel333
Builder

All,

I have this search which when done displays the ipaddress of people and the number of hits they made against our site. We found that people going over 1000 hits per minute were generally fraud.

index=apache_access_logs host=apache* /myapi/myevent| timechart count by clientip

I'd like the results of that search sent to me when a clienip exceeds 1000 in a minutes time.

How do I loop through the results and run a condution of where > 1000?

Tags (1)
0 Karma

vincesesto
Communicator

Hi daniel333,

If you create a new Alert through the management interface(Manager => Searches and Reports => Add New). It will allow you to set the Alert Condition, where you can choose "if number of events" then "is greater than".

It will step you through all of the process. I hope that this is what you are looking for.

Regards Vince

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...