<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Splunk Alert query syntax in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552525#M10518</link>
    <description>&lt;P&gt;I am just starting off with configuring up some Alerts in my Splunk environment.&lt;/P&gt;&lt;P&gt;One of the alerts that i have configured up as a test is to run a scheduled test once a day, looking to see whether any of the Cisco switches in my environment has restarted. I've configured up the following search:&lt;/P&gt;&lt;P&gt;index=&amp;lt;my_index&amp;gt; "%SYS-5-RESTART" | stats count&lt;/P&gt;&lt;P&gt;When using this as a simple search, this seems to work well, letting me know accurately if a switch has rebooted within the search time window. However with the alert that i have created from this search, it seems to be sending out an email regardless of the search result.&lt;/P&gt;&lt;P&gt;The Alert configuration i have used is as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Alert Type: scheduled (run everyday at 5pm)&lt;/LI&gt;&lt;LI&gt;Expires 24 hours&lt;/LI&gt;&lt;LI&gt;Trigger alert when: Number of Results is greater than 0&lt;/LI&gt;&lt;LI&gt;Trigger: once&lt;/LI&gt;&lt;LI&gt;Trigger Actions: Send email&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;even today, when i used the above search term for the last 24 hours, it is coming up with a count of 0 and yet Splunk is still forwarding out an email at 5pm. Is there something that i am missing with the alert syntax?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
    <pubDate>Fri, 21 May 2021 07:54:18 GMT</pubDate>
    <dc:creator>mike_k</dc:creator>
    <dc:date>2021-05-21T07:54:18Z</dc:date>
    <item>
      <title>Splunk Alert query syntax</title>
      <link>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552525#M10518</link>
      <description>&lt;P&gt;I am just starting off with configuring up some Alerts in my Splunk environment.&lt;/P&gt;&lt;P&gt;One of the alerts that i have configured up as a test is to run a scheduled test once a day, looking to see whether any of the Cisco switches in my environment has restarted. I've configured up the following search:&lt;/P&gt;&lt;P&gt;index=&amp;lt;my_index&amp;gt; "%SYS-5-RESTART" | stats count&lt;/P&gt;&lt;P&gt;When using this as a simple search, this seems to work well, letting me know accurately if a switch has rebooted within the search time window. However with the alert that i have created from this search, it seems to be sending out an email regardless of the search result.&lt;/P&gt;&lt;P&gt;The Alert configuration i have used is as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Alert Type: scheduled (run everyday at 5pm)&lt;/LI&gt;&lt;LI&gt;Expires 24 hours&lt;/LI&gt;&lt;LI&gt;Trigger alert when: Number of Results is greater than 0&lt;/LI&gt;&lt;LI&gt;Trigger: once&lt;/LI&gt;&lt;LI&gt;Trigger Actions: Send email&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;even today, when i used the above search term for the last 24 hours, it is coming up with a count of 0 and yet Splunk is still forwarding out an email at 5pm. Is there something that i am missing with the alert syntax?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 07:54:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552525#M10518</guid>
      <dc:creator>mike_k</dc:creator>
      <dc:date>2021-05-21T07:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Alert query syntax</title>
      <link>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552531#M10519</link>
      <description>&lt;P&gt;Your search is returning a result (count = 0) - add "| where count &amp;gt; 0" to your search so results are only returned when there is something worth alerting&lt;/P&gt;</description>
      <pubDate>Fri, 21 May 2021 08:20:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552531#M10519</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2021-05-21T08:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Alert query syntax</title>
      <link>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552663#M10525</link>
      <description>&lt;P&gt;thanks, that did the trick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 May 2021 01:24:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Splunk-Alert-query-syntax/m-p/552663#M10525</guid>
      <dc:creator>mike_k</dc:creator>
      <dc:date>2021-05-24T01:24:58Z</dc:date>
    </item>
  </channel>
</rss>

