Splunk Search

Trigger alert after checking results for 3 minutes?

sarit_s
Communicator

Hello

How can I trigger an alert after checking the results for 3 minuets 
So for example, if I want that the alert will trigger if count>1 , I would like to check for 3 minutes if count>1 and only then raise the alert

How can i do it ?

Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @sarit_s ,

you have to schedule your alert every three minutes and insert a stats count and a threshold, so if you want to count the events where there's an error, you could schedule every three minutes an alert like this:

index=your_index error="your_error"
| stats count
| where count>1

then you have to configure your alert to trigger if results are greater than zero.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...