Splunk Search

Simple stats conditional for alert

mikeely
Path Finder

I've set up a simple search for flapping interfaces on our switches, looks like so:

 LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host

What I'd like to do is get an alert using a conditional ... stats count by host > 5 in fifteen minutes or something like that. When I try this out it returns no data:

 LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host > 5

How do I get from there to where I want to be?

Tags (2)
0 Karma
1 Solution

gkanapathy
Splunk Employee
Splunk Employee
LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host | where count > 5

View solution in original post

gkanapathy
Splunk Employee
Splunk Employee
LINEPROTO-5-UPDOWN: Line protocol on Interface changed state to | stats count by host | where count > 5

mikeely
Path Finder

One would think I could have tried that myself but I've apparently got too many hats on today to be any good at one thing. Thanks!

0 Karma

gkanapathy
Splunk Employee
Splunk Employee

sorry, should be count > 5, not host. editing to fix.

mikeely
Path Finder

It looks like it should work but still "No results found" which is strange, when I take out the where clause, there are a couple values above five.

0 Karma
Get Updates on the Splunk Community!

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...

Unlock Database Monitoring with Splunk Observability Cloud

  In today’s fast-paced digital landscape, even minor database slowdowns can disrupt user experiences and ...