I'm trying to implement a search query in splunk to get anomalous values around a particular field in the service events. 
 Essentially the query looks something like this -  
   
   
   
 index="abc" source=*servicename*  response_time |    anomalousvalue action=summary pthresh=0.1|search isNum=YES fieldname=response_time 
   
   
   
 And this gives me a table containing fields like catAnoFreq% , numAnoFreq%, stdev, etc 
 I looked the documentation https://docs.splunk.com/Documentation/Splunk/9.0.3/SearchReference/Anomalousvalue 
 but didn't understand how exactly it works.  
 so for my query if the response_time field has a standard range of values across events, and if my p_thresh=0.1, does that mean that values which occur with a probability of just 10% will fall into the anomalous category? and if i wanted to set an alert on one of the fields in the table to detect anomaly, which would be recommended? i want to set the alert of any event where the response_time num field is not considered within the normal range. 
						
					
					... View more