Follow the steps in this recipe to create an alert that identifies abnormal response times:
- Log in to your Splunk server and select the Operational Intelligence application.
- Ensure that the time range picker is set to Last 60 Minutes and type the following search into the Splunk search bar. Then, click on the magnifying glass icon or hit Enter:
sourcetype=access_combined index=main | stats max(response) AS MAX by uri_path | join uri_path [search earliest=-25h latest=-24h sourcetype=access_combined index=main | stats avg(response) AS AVG by uri_path] | eval MAG=round(MAX/AVG)