Splunk Search

Simple stats conditional for alert

mikeely
Path Finder

I've set up a simple search for flapping interfaces on our switches, looks like so:

 LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host

What I'd like to do is get an alert using a conditional ... stats count by host > 5 in fifteen minutes or something like that. When I try this out it returns no data:

 LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host > 5

How do I get from there to where I want to be?

Tags (2)
0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee
LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host | where count > 5

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee
LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host | where count > 5

mikeely
Path Finder

One would think I could have tried that myself but I've apparently got too many hats on today to be any good at one thing. Thanks!

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

sorry, should be count > 5, not host. editing to fix.

mikeely
Path Finder

It looks like it should work but still "No results found" which is strange, when I take out the where clause, there are a couple values above five.

0 Karma
Get Updates on the Splunk Community!

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...

Unlock Faster Time-to-Value on Edge and Ingest Processor with New SPL2 Pipeline ...

Hello Splunk Community,   We're thrilled to share an exciting update that will help you manage your data more ...

Splunk MCP & Agentic AI: Machine Data Without Limits

Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization uses ...