Splunk Search

Alarm Condition Creation

daniel333
Builder

All,

I have this search which when done displays the ipaddress of people and the number of hits they made against our site. We found that people going over 1000 hits per minute were generally fraud.

index=apache_access_logs host=apache* /myapi/myevent| timechart count by clientip

I'd like the results of that search sent to me when a clienip exceeds 1000 in a minutes time.

How do I loop through the results and run a condution of where > 1000?

Tags (1)
0 Karma

vincesesto
Communicator

Hi daniel333,

If you create a new Alert through the management interface(Manager => Searches and Reports => Add New). It will allow you to set the Alert Condition, where you can choose "if number of events" then "is greater than".

It will step you through all of the process. I hope that this is what you are looking for.

Regards Vince

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...