Splunk Search

help for standard deviation with percentage query

dhavamanis
Builder

We have filed "status' and it will capture the http status code like 200, 301,302,404,503..etc. We want to setup alert if any increased 1% percentage of standard deviation in last 5 minutes for status ="5*" need to trigger an alert.

Can you please help us to write the Splunk query to calculate standard deviation with increased 1% in the last 5 minutes to display results.

Example: 503 status code in the last 5 minutes always less than 0.5 percentage. some cases the error condition it may increase the count 1% error rate from 0.5 %. in this situation need to trigger an alert.

Tags (2)
0 Karma

richcollier
Path Finder

You could try the Prelert app (https://splunkbase.splunk.com/app/1306/) to detect anomalies instead - it uses machine learning to automatically detect anomalous deviations using a more sophisticated (and thus more accurate) modeling than just standard deviations. You can alert on these anomalies that are detected.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...