Splunk Search

trigger an alert if a process is taking more than the expected time

kranthimutyala
Path Finder

Hi Splunkers,

I have the below logs and trying to create an alert if a process run is taking more than the expected time.

2021-03-24T14:00:14.8 STATUS=Successful,ACTIVITY AT=2021-03-24T14:00:14,ACTION TYPE=Process started

2021-03-24T14:05:21.54 STATUS=Successful,ACTIVITY AT=2021-03-24T14:05:21,TYPE=Process finished

Im using the below query to track the same but it is triggering an alert even if the process is completed well within the limit

index="abc" TYPE="Process started"
| eval last_seen=_time
| eval mins_since = round((now() - last_seen) / (60))
|table mins_since |search mins_since>10

From the above logs the alert shouldn't trigger since process has finished in 5mins but i'm getting false positives.The alert should trigger only if Process is not finished and mins_since>10.

I tried search TYPE!="Process finished" AND mins_since>10 but still not getting desired results.Please help me in this scenario.Thanks.

 

 

0 Karma
1 Solution

scelikok
SplunkTrust
SplunkTrust

Hi @kranthimutyala,

Since you are not checking if Process finished or not  result may wrong. Please try this.

index="abc" TYPE="Process started"
| dedup TYPE | head 1
| eval mins_since = round((now() - _time) / 60)
| where TYPE="Process started" AND mins_since>10
| table min_since
If this reply helps you an upvote and "Accept as Solution" is appreciated.

View solution in original post

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @kranthimutyala,

Since you are not checking if Process finished or not  result may wrong. Please try this.

index="abc" TYPE="Process started"
| dedup TYPE | head 1
| eval mins_since = round((now() - _time) / 60)
| where TYPE="Process started" AND mins_since>10
| table min_since
If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma
Get Updates on the Splunk Community!

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Easily Improve Agent Saturation with the Splunk Add-on for OpenTelemetry Collector

Agent Saturation What and Whys In application performance monitoring, saturation is defined as the total load ...