Splunk Search

Alarm Condition Creation

daniel333
Builder

All,

I have this search which when done displays the ipaddress of people and the number of hits they made against our site. We found that people going over 1000 hits per minute were generally fraud.

index=apache_access_logs host=apache* /myapi/myevent| timechart count by clientip

I'd like the results of that search sent to me when a clienip exceeds 1000 in a minutes time.

How do I loop through the results and run a condution of where > 1000?

Tags (1)
0 Karma

vincesesto
Communicator

Hi daniel333,

If you create a new Alert through the management interface(Manager => Searches and Reports => Add New). It will allow you to set the Alert Condition, where you can choose "if number of events" then "is greater than".

It will step you through all of the process. I hope that this is what you are looking for.

Regards Vince

0 Karma
Get Updates on the Splunk Community!

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...