Splunk Search

Anomalydetection

anna11
New Member

Hello Splunk team, I was troubleshooting one query with anomalydetection command (https://docs.splunk.com/Documentation/SplunkCloud/9.1.2312/SearchReference/Anomalydetection), and one thing came to my attention. While using action=filter I'm still seeing events with probable_cause_freq=1.0000 and log_event_prob=0.000

Should that actually happen? is log_event_prob=0.000 a threshold ? it's not an issue for me to filter it, i just wanted to double check if that is expected behaviour, as i couldn't find it in the documentation.

Thanks!

Tags (1)
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...