<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating Alerts  When You Don't Know What to Search For?? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80070#M1126</link>
    <description>&lt;P&gt;I guess my problem is getting the correct information when events haven't happened yet.&lt;BR /&gt;
So, how do I know what to trigger on when an event has not happened yet?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ray&lt;/P&gt;</description>
    <pubDate>Fri, 23 Sep 2011 13:22:20 GMT</pubDate>
    <dc:creator>Rayj00</dc:creator>
    <dc:date>2011-09-23T13:22:20Z</dc:date>
    <item>
      <title>Creating Alerts  When You Don't Know What to Search For??</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80068#M1124</link>
      <description>&lt;P&gt;I'm a newbe with Splunk.  So, if an event never happened before (like failed authentication for instance), Splunk obviously does not have it indexed.   How do I set up an alert if a failed authorization happens, say, 10 times in 5 minutes?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ray&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2011 17:26:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80068#M1124</guid>
      <dc:creator>Rayj00</dc:creator>
      <dc:date>2011-09-22T17:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Alerts  When You Don't Know What to Search For??</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80069#M1125</link>
      <description>&lt;P&gt;If there's a field in your data that represents auth status (success, etc.), you can set up your search using the != operator.  (not equal to)&lt;/P&gt;

&lt;P&gt;... &lt;CODE&gt;myAuthStatusField!=success&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Or, if you know what the value WOULD be for a failed login, it's better to be specific and use &lt;/P&gt;

&lt;P&gt;... &lt;CODE&gt;myAuthStatusField=failed&lt;/CODE&gt; (or denied, or whatever the value would potentially be)&lt;/P&gt;

&lt;P&gt;Then set your search schedule to run every 5 minutes for a time range of the last 5 minutes.  Set your alert conditions to "if number of events is greater than 9".&lt;/P&gt;

&lt;P&gt;If you don't have that field defined and haven't extracted a new field before, you can read the full documentation here:  &lt;A href="http://docs.splunk.com/Documentation/Splunk/4.2.3/User/ExtractNewFields"&gt;http://docs.splunk.com/Documentation/Splunk/4.2.3/User/ExtractNewFields&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2011 20:40:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80069#M1125</guid>
      <dc:creator>sfleming</dc:creator>
      <dc:date>2011-09-22T20:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Alerts  When You Don't Know What to Search For??</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80070#M1126</link>
      <description>&lt;P&gt;I guess my problem is getting the correct information when events haven't happened yet.&lt;BR /&gt;
So, how do I know what to trigger on when an event has not happened yet?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Ray&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2011 13:22:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80070#M1126</guid>
      <dc:creator>Rayj00</dc:creator>
      <dc:date>2011-09-23T13:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: Creating Alerts  When You Don't Know What to Search For??</title>
      <link>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80071#M1127</link>
      <description>&lt;P&gt;If it's a common application (such as say windows login) you can google for the exception.  Or, if it's an homegrown app, ask your developers.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2011 13:46:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Creating-Alerts-When-You-Don-t-Know-What-to-Search-For/m-p/80071#M1127</guid>
      <dc:creator>Brian_Osburn</dc:creator>
      <dc:date>2011-09-23T13:46:09Z</dc:date>
    </item>
  </channel>
</rss>

