Here's my entry from savedsearches.conf. Thanks for the help so far
[Response Time > 5 Sec]
action.email = 1
action.email.include.trigger = 1
action.email.reportServerEnabled = 0
action.email.subject.alert = Splunk Alert: $result.Call5$ Resp > 5 Sec
action.email.to = DOTCOM_PERFORMANCE_MONITORING_ALERTS@xxxxxxx.com
action.email.useNSSubject = 1
alert.digest_mode = 0
alert.suppress = 0
alert.track = 1
counttype = number of events
cron_schedule = * * * * *
description = This alert goes off when a web service call takes longer than 5 seconds
dispatch.earliest_time = -1m
dispatch.latest_time = now
display.events.fields = ["host","TYPE","CLASSPATH","splunk_server","Status","City","Code","GUID","req","resp","duration","CLASS","linecount","GUID1"]
display.page.search.mode = verbose
display.visualizations.chartHeight = 279
display.visualizations.charting.chart = line
enableSched = 1
quantity = 0
relation = greater than
request.ui_dispatch_app = search
request.ui_dispatch_view = search
search = index=uvtrans | transaction GUID startswith="*request" endswith="*response" | WHERE duration>5
... View more