Splunk Search

How to create alert search using mstats

jstell
Engager

I know that events and metrics use different index types. Does that mean I can't create an alert (outside of metrics workspace) using an SPL search with mstats?
E.g., I am pumping collectd uptime info into splunk. I want to trigger an alert on recent reboots.

| mstats min(_value) as uptime WHERE metric_name="uptime.value" AND "index"="collectd_http" span=120s BY "host"| search uptime < 10000 | stats count by host

This returns statistics results, but does not trigger an alert.

I've found the alert creation functionality in the Metrics Workspace to be somewhat limiting, and wasn't able to get an alert for this condition to work there, either. When I split by host and try to display the "lowest" hosts, it doesn't display the hosts with the lowest uptime value. Also, I haven't found a way to get the metrics alerts to send me the correct host name.

0 Karma
1 Solution

adonio
Ultra Champion

same like any other splunk alert, schedule it, set the trigger condition and thats it ..
stats strips unspecified fields
try this:

| mstats min(_value) as uptime WHERE metric_name="uptime.value" AND "index"="collectd_http" span=120s BY "host"
 | search uptime < 10000 
 | stats min(uptime) as lowest_uptime count_as event_count by host

hope it helps

View solution in original post

0 Karma

jstell
Engager

I figured out that it was an error in my cron expression 😕

Splunk: Please add some UI functionality that tells me when the alert will run.

0 Karma

adonio
Ultra Champion

same like any other splunk alert, schedule it, set the trigger condition and thats it ..
stats strips unspecified fields
try this:

| mstats min(_value) as uptime WHERE metric_name="uptime.value" AND "index"="collectd_http" span=120s BY "host"
 | search uptime < 10000 
 | stats min(uptime) as lowest_uptime count_as event_count by host

hope it helps

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Introducing Splunk 10.0: Smarter, Faster, and More Powerful Than Ever

Now On Demand Whether you're managing complex deployments or looking to future-proof your data ...