Splunk Search

help for standard deviation with percentage query

dhavamanis
Builder

We have filed "status' and it will capture the http status code like 200, 301,302,404,503..etc. We want to setup alert if any increased 1% percentage of standard deviation in last 5 minutes for status ="5*" need to trigger an alert.

Can you please help us to write the Splunk query to calculate standard deviation with increased 1% in the last 5 minutes to display results.

Example: 503 status code in the last 5 minutes always less than 0.5 percentage. some cases the error condition it may increase the count 1% error rate from 0.5 %. in this situation need to trigger an alert.

Tags (2)
0 Karma

richcollier
Path Finder

You could try the Prelert app (https://splunkbase.splunk.com/app/1306/) to detect anomalies instead - it uses machine learning to automatically detect anomalous deviations using a more sophisticated (and thus more accurate) modeling than just standard deviations. You can alert on these anomalies that are detected.

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...