Alerting

How to set up an index search alert based on a hourly record count that exceeds a certain threshold?

Raf001
New Member

Hi all, just wanted to ask the best practice approach for my requirement.

Currently I have a real-time search which populates a simple chart. It simply displays a count of error records from an error log table in our database grouped in hourly buckets.

I'm using a search like | bucket _time span=1h | stats count by _time |

Now I also need to create an alert which will send an email if an error count in an hourly grouping exceeds a fixed value, e.g. 50

My initial thought is to simply set up an hourly schedule to count the number of records directly from the Error log table and if the count exceeds 50 then trigger the alert, but I'm sure there is a better and more robust way of doing this. Would appreciate any suggestions.

Many thanks in advance!

0 Karma

stephanefotso
Motivator

Here you go.

Run this search and save it as an Alert: ... | stats count

  • Alert Name: Errors_Alert
  • Alert Type: RealTime
  • Trigger condition : custom
  • custom condition: count>50
  • in 1 hour
  • .......

Thanks

SGF
0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...