Alerting

Alert - Time interval

monteirolopes
Communicator

Hi,

I am using the function:

| stats count(name) AS x by name | where x >4

Results:

name count(name)
Paul 10
John 3

I would like to receive alerts when the number of names (count(name)) is greater than 4 in a 5 minutes time interval, after five minutes, the count will reset and start count again.
This alert must be set in real time or Cron Scheduled time? How Can I define 5 minutes on Cron Expression?

Best Regards,
Monteiro.

0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

You have to configure an alert using your search with a time period of 5 minutes and schedule it with this cron definition

*/5 * * * *

Bye.
Giuseppe

View solution in original post

somesoni2
Revered Legend

If, you're ok with a delay of 5min to get the alert, run on Cron schedule time. Real-time alerts are expensive and they never complete. See @Cusello's answer for 5 min cron.

0 Karma

gcusello
SplunkTrust
SplunkTrust

You have to configure an alert using your search with a time period of 5 minutes and schedule it with this cron definition

*/5 * * * *

Bye.
Giuseppe

lyndac
Contributor

I believe the cron expression you are looking for is: 5 * * * *

0 Karma

somesoni2
Revered Legend

Nopes... this is for running a search hourly at 5th min.

0 Karma

lyndac
Contributor

Giuseppe is correct above, that is what I thought I typed, but apparently my fingers went another way.
Sorry. */5 * * * * is the correct one.

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...