Splunk Search

Splunk alert base on current count vs last week count

cbiraris
Path Finder

Hi Team,

I need help to create a alert which can raise if latest hour count is 10% less than last week same day same hour count.  

for example: right now i can able to get count but not sure how to find  10%  or more difference to get alert.


 index=ABC sourcetype=XYZ | timechart span=1h count | timewrap d series=short 



 

 

Labels (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| eval change=100*(s0-s7)/s7
0 Karma
Get Updates on the Splunk Community!

Monitoring Postgres with OpenTelemetry

Behind every business-critical application, you’ll find databases. These behind-the-scenes stores power ...

Mastering Synthetic Browser Testing: Pro Tips to Keep Your Web App Running Smoothly

To start, if you're new to synthetic monitoring, I recommend exploring this synthetic monitoring overview. In ...

Splunk Edge Processor | Popular Use Cases to Get Started with Edge Processor

Splunk Edge Processor offers more efficient, flexible data transformation – helping you reduce noise, control ...