Splunk Search

Alerting on a threshold

SecureIA
Path Finder

Hi all,

I currently have a very simple search that looks at the distinct visitors for a website per day. See below,

sourcetype=iis | stats dc(cs_username)

Is there a way of converting this search to an alert which will trigger when there is an abnormally high amount of visitors?

Any help would be massively appreciated.

0 Karma

twinspop
Influencer

If you want something dynamic, you could use timechart + delta + stream stats. Something along these lines:

sourcetype=iis earliest=-6m@m latest=@m|
  timechart span=1m dc(cs_username) as DU |
  delta DU as Delta |
  streamstats window=5 current=f global=t avg(Delta) as AvgLast5Delta |
  eval PercentageChange=100*round((AvgLast5Delta-Delta)/AvgLast5Delta,4) |
  tail 1

Alert on (absolute?) PercentageChange being bigger than some number.

EDIT: Made PercentageChange an actual percentage

0 Karma

DMohn
Motivator

You can always select the "Save as" option (right top, above the time range picker) and save the search as an alert.

If you want the alert to trigger as soon as the dc(cs_username) exceeds a certain number, change the Alert type to Real-time, and set the needed trigger conditions.

Then you can add an alert action to this alert (could be email, script, ...)

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...