Splunk Search

help for standard deviation with percentage query

dhavamanis
Builder

We have filed "status' and it will capture the http status code like 200, 301,302,404,503..etc. We want to setup alert if any increased 1% percentage of standard deviation in last 5 minutes for status ="5*" need to trigger an alert.

Can you please help us to write the Splunk query to calculate standard deviation with increased 1% in the last 5 minutes to display results.

Example: 503 status code in the last 5 minutes always less than 0.5 percentage. some cases the error condition it may increase the count 1% error rate from 0.5 %. in this situation need to trigger an alert.

Tags (2)
0 Karma

richcollier
Path Finder

You could try the Prelert app (https://splunkbase.splunk.com/app/1306/) to detect anomalies instead - it uses machine learning to automatically detect anomalous deviations using a more sophisticated (and thus more accurate) modeling than just standard deviations. You can alert on these anomalies that are detected.

0 Karma
Get Updates on the Splunk Community!

Detecting Remote Code Executions With the Splunk Threat Research Team

WATCH NOWRemote code execution (RCE) vulnerabilities pose a significant risk to organizations. If exploited, ...

Enter the Splunk Community Dashboard Challenge for Your Chance to Win!

The Splunk Community Dashboard Challenge is underway! This is your chance to showcase your skills in creating ...

.conf24 | Session Scheduler is Live!!

.conf24 is happening June 11 - 14 in Las Vegas, and we are thrilled to announce that the conference catalog ...