<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exponential alerting - How to setup a +1 event alert? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211574#M3780</link>
    <description>&lt;P&gt;Done &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Sep 2016 11:56:09 GMT</pubDate>
    <dc:creator>soniquella</dc:creator>
    <dc:date>2016-09-23T11:56:09Z</dc:date>
    <item>
      <title>Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211566#M3772</link>
      <description>&lt;P&gt;Good morning.&lt;/P&gt;

&lt;P&gt;I am trying to create an e-mailed alert for when specific user accounts attempt a remote(logon_type=10) or interactive (logon_type=2) attempt to log in to specific servers( tag=taggedservers)&lt;/P&gt;

&lt;P&gt;My search returns a number of results for the last 24 hours (set) but I would like to receive an e-mailed alert each time a new log in from one of the user accounts is attempted.&lt;/P&gt;

&lt;P&gt;The lookup referred to is to show logon_type description in tabled results.&lt;/P&gt;

&lt;P&gt;This is my search syntax:&lt;/P&gt;

&lt;P&gt;tag=taggedservers EventCode=4624 OR EventCode=4634 OR EventCode=4647 OR EventCode=4625 OR EventCode=4778 OR EventCode=4779 OR EventCode=4800 OR EventCode=4801 (user=adminuser1 OR user=adminuser2 OR user=adminuser3 OR user=adminuser4) ((Logon_Type=2 OR Logon_Type=10)) | lookup LogonTypeLookups.csv Logon_Type OUTPUT Logon_Desc&lt;/P&gt;

&lt;P&gt;How do I create an alert without using realtime selection, each time one of the admin users attempts connections to my tagged servers? If you have any suggestions for improvements to the search then I would be grateful to hear.&lt;/P&gt;

&lt;P&gt;Any help would be appreciated.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Rob.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:08:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211566#M3772</guid>
      <dc:creator>soniquella</dc:creator>
      <dc:date>2020-09-29T11:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211567#M3773</link>
      <description>&lt;P&gt;i am not sure of this requirement, but i assume, you wanted email notifications related to this search. &lt;BR /&gt;
you can save this search query as an alert (a scheduled alert), setup a cron schedule for how frequent this query should run, then you can enable an email alert, when the search query returns the expected results. &lt;/P&gt;

&lt;P&gt;Create scheduled alerts - &lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.3/Alert/Definescheduledalerts"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.3/Alert/Definescheduledalerts&lt;/A&gt;&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.3/Alert/Emailnotification"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.3/Alert/Emailnotification&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Update -&lt;/STRONG&gt; &lt;BR /&gt;
Sorted. Changed search to earliest=-15m@m and then scheduled a cron job to run every 15 minutes and alert if stats count &amp;gt; 0.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 09:32:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211567#M3773</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2016-09-23T09:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211568#M3774</link>
      <description>&lt;P&gt;Thanks for you response. My issue is that I do not want this to run at scheduled set time periods but rather a 'live' response. Due to the secure nature of the servers in question, I need to be alerted immediately when one of these accounts attempts connection. Thanks, Rob.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 09:49:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211568#M3774</guid>
      <dc:creator>soniquella</dc:creator>
      <dc:date>2016-09-23T09:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211569#M3775</link>
      <description>&lt;P&gt;ok then, you can choose &lt;STRONG&gt;real-time alerts&lt;/STRONG&gt; - &lt;/P&gt;

&lt;P&gt;Use a real-time alert to monitor events or event patterns as they happen. You can create real-time alerts with per-result triggering or rolling time window triggering. Real-time alerts can be costly in terms of computing resources, so consider using a scheduled alert when possible.&lt;BR /&gt;
&lt;STRONG&gt;Create a real-time alert with per-result triggering&lt;/STRONG&gt;&lt;BR /&gt;
Real-time alerts with per-result triggering are sometimes known as "per-result alerts". This alert type and triggering use a continuous real-time search to look for events. Each search result triggers the alert.&lt;/P&gt;

&lt;P&gt;Caution: In a high availability deployment, use per-result triggering with caution. If a peer is not available, a real-time search does not warn that the search might be incomplete. It is recommended to use a scheduled alert for this deployment.&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.3/Alert/DefineRealTimeAlerts"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.3/Alert/DefineRealTimeAlerts&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 10:04:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211569#M3775</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2016-09-23T10:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211570#M3776</link>
      <description>&lt;P&gt;Thank you. I did also try this but seemed to be immediately flooded with historical event alerts rather than new alerts from new log ins. I'll give it a read through and see if I missed something.&lt;/P&gt;

&lt;P&gt;I do appreciate your assistance with this.&lt;/P&gt;

&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 10:08:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211570#M3776</guid>
      <dc:creator>soniquella</dc:creator>
      <dc:date>2016-09-23T10:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211571#M3777</link>
      <description>&lt;P&gt;if you want this to work only for new events, then, maybe, you can add earliest and latest fields - &lt;BR /&gt;
for example - &lt;CODE&gt;earliest=-5m@m latest=now&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;tag=taggedservers EventCode=4624 OR EventCode=4634 OR EventCode=4647 OR EventCode=4625 OR EventCode=4778 OR EventCode=4779 OR EventCode=4800 OR EventCode=4801 (user=adminuser1 OR user=adminuser2 OR user=adminuser3 OR user=adminuser4) ((Logon_Type=2 OR Logon_Type=10)) &lt;CODE&gt;earliest=-5m@m latest=now&lt;/CODE&gt; | lookup LogonTypeLookups.csv Logon_Type OUTPUT Logon_Desc&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 11:05:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211571#M3777</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2020-09-29T11:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211572#M3778</link>
      <description>&lt;P&gt;Sorted. Changed search to earliest=-15m@m and then scheduled a cron job to run every 15 minutes and alert if stats count &amp;gt; 0.&lt;BR /&gt;
Thank you very much for your help with this.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 11:52:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211572#M3778</guid>
      <dc:creator>soniquella</dc:creator>
      <dc:date>2016-09-23T11:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211573#M3779</link>
      <description>&lt;P&gt;Great.. can you please mark this as accepted answer, and few upvotes &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 11:54:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211573#M3779</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2016-09-23T11:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Exponential alerting - How to setup a +1 event alert?</title>
      <link>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211574#M3780</link>
      <description>&lt;P&gt;Done &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Sep 2016 11:56:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Exponential-alerting-How-to-setup-a-1-event-alert/m-p/211574#M3780</guid>
      <dc:creator>soniquella</dc:creator>
      <dc:date>2016-09-23T11:56:09Z</dc:date>
    </item>
  </channel>
</rss>

