Alerting

field value occurence treshold

HansK
Path Finder

I want to create an alert with a certain treshold

I have this query:
host="abc0*" DN=* NOT DN="45643232*" NOT DN="53222455*"

Any time a distinct DN occurs more than 10 times per second I would like to be alerted.

How can I set this up?

0 Karma

rturk
Builder

Using the _internal index, here's the best approximation I can give you (my server name is "Voyager-2"):

index=_internal | timechart span=1s count by host | search Voyager-2>10

So in your case, something like this should do the trick:

host="abc0" DN= NOT DN="45643232" NOT DN="53222455" | timechart span=1s count by host

Then you create an alert based on your saved search that will trigger if the number of results is greater than 10.

Hope this helps 🙂

0 Karma

HansK
Path Finder

hmm, still alerting when there are 10 occurence of any DN, not when a single DN is >10

0 Karma

rturk
Builder

Ahh in that case, try this:

host="abc0" DN= NOT DN="45643232" NOT DN="53222455" | timechart span=1s dc(_raw) by DN

0 Karma

HansK
Path Finder

host="abc0" DN= NOT DN="45643232" NOT DN="53222455" | timechart span=1s count by DN

This comes closer than I was, but this will alert if the occurence of DN is higher than 10 per second.

DN can hold many values, I need it to alert when a distinct value occurs more than 10 times per second.

Thanks for helping though

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...