Alerting

How to set up an index search alert based on a hourly record count that exceeds a certain threshold?

Raf001
New Member

Hi all, just wanted to ask the best practice approach for my requirement.

Currently I have a real-time search which populates a simple chart. It simply displays a count of error records from an error log table in our database grouped in hourly buckets.

I'm using a search like | bucket _time span=1h | stats count by _time |

Now I also need to create an alert which will send an email if an error count in an hourly grouping exceeds a fixed value, e.g. 50

My initial thought is to simply set up an hourly schedule to count the number of records directly from the Error log table and if the count exceeds 50 then trigger the alert, but I'm sure there is a better and more robust way of doing this. Would appreciate any suggestions.

Many thanks in advance!

0 Karma

stephanefotso
Motivator

Here you go.

Run this search and save it as an Alert: ... | stats count

  • Alert Name: Errors_Alert
  • Alert Type: RealTime
  • Trigger condition : custom
  • custom condition: count>50
  • in 1 hour
  • .......

Thanks

SGF
0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...