Splunk Search

Anomalydetection

anna11
New Member

Hello Splunk team, I was troubleshooting one query with anomalydetection command (https://docs.splunk.com/Documentation/SplunkCloud/9.1.2312/SearchReference/Anomalydetection), and one thing came to my attention. While using action=filter I'm still seeing events with probable_cause_freq=1.0000 and log_event_prob=0.000

Should that actually happen? is log_event_prob=0.000 a threshold ? it's not an issue for me to filter it, i just wanted to double check if that is expected behaviour, as i couldn't find it in the documentation.

Thanks!

Tags (1)
0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...