Alerting

Need Help on alerts

praneethlekkala
Path Finder

Hi

I have created an alert which checks the transaction's response time, if the response time is more than 10 mins splunk will send an email alert

Here is the search query:

sourcetype="access_log" host=hostname*
| eval headers=split(_raw," ")
| eval username=mvindex(headers,2)
| eval method=mvindex(headers,5)
| eval Request=mvindex(headers,6)
| eval Status=mvindex(headers,8)
| eval Payload=mvindex(headers,9)
| eval req_time=mvindex(headers,10)
| eval uri=mvindex(headers,11)
| eval Method=replace(method,"\"","")
| eval uri=replace(uri,"\"","")
| eval RequestTime_Minutes = req_time*0.0000166667
| eval Response_Time_in_Minutes= round(RequestTime_Minutes,2) | table Response_Time_in_Minutes host username _time uri Request Status
| search Response_Time_in_Minutes > 10

 

My Question:

I want to exclude 1 particular transaction:

"searchrequest-excel-all-fields"


I do not want the alerts if its the above mentioned transaction since it doesn't affect our app in any way, how do i go about it?

 

Labels (3)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Try adding 

AND NOT "searchrequest-excel-all-fields"

to your final search

View solution in original post

ITWhisperer
SplunkTrust
SplunkTrust

Try adding 

AND NOT "searchrequest-excel-all-fields"

to your final search

Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...