<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Real time alerts in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40964#M493</link>
    <description>&lt;P&gt;I've added screenshot of the config as well as seeing a result when I'm running the search. nothing in alert manager. no email response. other emails on the system are working (e.g. scheduled pdf report view). My email address is pretty standard - brett at mycompany dot com.&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2013 10:39:27 GMT</pubDate>
    <dc:creator>brettcave</dc:creator>
    <dc:date>2013-08-21T10:39:27Z</dc:date>
    <item>
      <title>Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40950#M479</link>
      <description>&lt;P&gt;I originally posted &lt;A href="http://answers.splunk.com/answers/99570/whats-the-correct-format-for-multiple-email-addresses-in-an-alert"&gt;this&lt;/A&gt; because our alerts weren't working, and I wanted to confirm the syntax for multiple recipients. It seems that our alerts still aren't working (not getting email notification or showing in the alert manager). One of the comments posted in the other question was that alltime realtime (rt / rt) alerts should not be configured, and we had a number of them. So what is the best way to configure real-time searches then? Our use-case is that we want to be notified as soon as certain events occur.&lt;/P&gt;

&lt;P&gt;I went in to all the "rt rt" searches, and changed them to "rt-1m / rt-0m" time frames, with condition "always" and alert mode "per-result" with some relevant field throttling, but after running some tests, we're not getting the notifications as expected.&lt;/P&gt;

&lt;P&gt;I'm considering combining all of our rt/rt searches into 1 monster query (we had about 15 odd searches) with the use of ()'s and ANDs / ORs, so that one search matches all (although identifying which condition triggered it by subject will be a nightmare, unless we have some crazy eval + case to inject a label).&lt;/P&gt;

&lt;P&gt;What is the best approach for configuring searches to notify email addresses as certain events occur?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2013 15:39:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40950#M479</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-20T15:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40951#M480</link>
      <description>&lt;P&gt;When you look at the report//alert in Manager, what does the scheduled time say?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2013 23:27:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40951#M480</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-08-20T23:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40952#M481</link>
      <description>&lt;P&gt;Splunk is not the ideal tool for literal "real-time" alerting.  If you need truly real-time alerting you need a real-time monitoring platform (Nagios or similar under Linux, for instance).  That said unless you are using something of the ilk of SNMP traps to initiate alerts, nothing is ever truly real time, as you are inevitably relying on a regular polling of whatever conditional semaphores you are monitoring, even if that polling is something like once a second.&lt;/P&gt;

&lt;P&gt;The best you can really achieve with Splunk is regular searches running at short intervals over short time spans (e.g. scheduled to run every minute, and only cover a span of a minute - or possibly two just to ensure overlap and that nothing falls through the cracks).&lt;/P&gt;

&lt;P&gt;Really, it comes down to just how instantaneous you need your alert to be.  After all, if you are relying on e-mail alerts you could conceivably fall foul of delivery delays.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 03:18:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40952#M481</guid>
      <dc:creator>grijhwani</dc:creator>
      <dc:date>2013-08-21T03:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40953#M482</link>
      <description>&lt;P&gt;We originally used nagios / zabbix as our monitoring system. Those tools are great for OS / platform monitoring (although the *nix app works pretty well in splunk too). We've tried to consolidate our logging in splunk (instead of managing more than 1 app) - so for now, we are looking to get close to real time monitoring. By "close", i mean notified within a minute or 2 (immediate not necessary).&lt;/P&gt;

&lt;P&gt;so with that in mind, use a -2m / 0 range scheduled to run every minute, with a 1 minute suppression based on a unique field (e.g. a run id for a job) would be a good approach?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 08:27:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40953#M482</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T08:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40954#M483</link>
      <description>&lt;P&gt;Schedule this alert: checked&lt;BR /&gt;
Alert Condition: always&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 08:27:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40954#M483</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T08:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40955#M484</link>
      <description>&lt;P&gt;I would like to know the search and the throttling parameters. The real time alerts work fine, i had struggled with it but i got it worked with precision. So do explain with the search and condition so that we can look at. Probably you can show us in the image.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 09:10:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40955#M484</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-21T09:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40956#M485</link>
      <description>&lt;P&gt;out of the 15 searches, it depends on the search. For example, we have one that has:&lt;/P&gt;

&lt;P&gt;For example, one alert that we want to be notified when a user of our application triggers a certain condition has "Once per result" with throttling of 1 hour based on UserID.&lt;/P&gt;

&lt;P&gt;However, we have another alert that monitors logs from the application to the database. We don't want to throttle this event though, every time the application has an error connecting to the database, we want it to email us. We currently have rt-1h to rt-0 with condition of "number of events" &amp;gt; 0 and 1 hour throttling based on "host"&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 09:22:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40956#M485</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T09:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40957#M486</link>
      <description>&lt;P&gt;It doesn't depend on whether you have 15/20 realtime searches, it's about how it's configured.&lt;/P&gt;

&lt;P&gt;Are you getting any mail for any of the configured alert?&lt;/P&gt;

&lt;P&gt;If not these are the possible cause may happen:&lt;BR /&gt;
 The sendmail.py file which sends the mail may be corrupt.&lt;BR /&gt;
 The alert condition doesn't match any event.&lt;BR /&gt;
 The throttling parameter is not the actual field name&lt;BR /&gt;
 The SMTP server is not configured correctly.&lt;/P&gt;

&lt;P&gt;simple way to test from search app:&lt;/P&gt;

&lt;P&gt;...| sendemail to=&lt;A href="mailto:abc@abc.com"&gt;abc@abc.com&lt;/A&gt; server=smtp_server sendresults=true format=html inline=true &lt;/P&gt;

&lt;P&gt;test it under &lt;A href="http://server:8000/en-US/app/App/flashtimeline"&gt;http://server:8000/en-US/app/App/flashtimeline&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 09:45:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40957#M486</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-21T09:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40958#M487</link>
      <description>&lt;P&gt;I don't think it's at the SMTP level, because i have tracking enabled, and the alltime / realtime (rt rt) searches weren't even showing in the alert manager.&lt;/P&gt;

&lt;P&gt;The alert condition SHOULD match an event - if I open the search from the "Searches and Reports" drop down, then I can see the events showing. However, its something to do with rt/rt config that seems to be breaking it. I've been fiddling around, but am busy configuring a specific test case to check what happens.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 09:49:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40958#M487</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T09:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40959#M488</link>
      <description>&lt;P&gt;Created a test case. search is &lt;CODE&gt;RequestURI="/ping" | table _time RequestURI&lt;/CODE&gt;. Created 2 alerts: 1 alltime/real-time with no throttling and another  realtime/1minute rolling window with "number of events" &amp;gt; 0, with alert mode "once per search" and 60 second throttling.  Both alerts have tracking enabled with 24 hour expiration.&lt;/P&gt;

&lt;P&gt;I hit the URI to trigger the event - GET /ping. I am running both searches in 2 splunk windows. Both manually running searches show the hit. I don't get a notification. The alert manager doesn't show anything. Both alerts have 2 email addresses configured (comma sep.)&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 10:01:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40959#M488</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T10:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40960#M489</link>
      <description>&lt;P&gt;Emails should be separated by ";"&lt;BR /&gt;
action.email = 1&lt;BR /&gt;
action.email.cc = abc.abc@com;abc.abc@com&lt;BR /&gt;
action.email.from = abc.abc@com&lt;BR /&gt;
action.email.inline = 1&lt;BR /&gt;
action.email.sendresults = 1&lt;BR /&gt;
action.email.to = abc.abc@com&lt;BR /&gt;
alert.digest_mode = False&lt;BR /&gt;
alert.expires = 30m&lt;BR /&gt;
alert.suppress = 1&lt;BR /&gt;
alert.suppress.fields = host&lt;BR /&gt;
alert.suppress.period = 1h&lt;BR /&gt;
alert.track = 0&lt;BR /&gt;
cron_schedule = * * * * *&lt;BR /&gt;
dispatch.earliest_time = rt&lt;BR /&gt;
dispatch.latest_time = rt&lt;BR /&gt;
displayview = flashtimeline&lt;BR /&gt;
enableSched = 1&lt;BR /&gt;
quantity = 0&lt;BR /&gt;
relation = greater than&lt;BR /&gt;
request.ui_dispatch_view = flashtimeline&lt;BR /&gt;
search = .....&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:36:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40960#M489</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2020-09-28T14:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40961#M490</link>
      <description>&lt;P&gt;In which app the alert is configured?&lt;/P&gt;

&lt;P&gt;Is the Request_URI is an extracted field?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 10:15:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40961#M490</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-21T10:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40962#M491</link>
      <description>&lt;P&gt;it's configured in search. RequestURI is an extracted field. It has full view permissions. &lt;A href="http://answers.splunk.com/answers/99570/whats-the-correct-format-for-multiple-email-addresses-in-an-alert"&gt;http://answers.splunk.com/answers/99570/whats-the-correct-format-for-multiple-email-addresses-in-an-alert&lt;/A&gt; - answer stats "comma or semi-colon to seperate email addresses" - I have changed the alert to use 1 email address. still not registering.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 10:26:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40962#M491</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T10:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40963#M492</link>
      <description>&lt;P&gt;&lt;IMG src="http://splunk-base.splunk.com//storage/AlertConfig.png" alt="config" /&gt;&lt;/P&gt;

&lt;P&gt;&lt;IMG src="http://splunk-base.splunk.com//storage/AlertRealTime.png" alt="alt text" /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 10:38:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40963#M492</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T10:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40964#M493</link>
      <description>&lt;P&gt;I've added screenshot of the config as well as seeing a result when I'm running the search. nothing in alert manager. no email response. other emails on the system are working (e.g. scheduled pdf report view). My email address is pretty standard - brett at mycompany dot com.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 10:39:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40964#M493</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T10:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40965#M494</link>
      <description>&lt;P&gt;Could you run this in your search replacing the correct values?&lt;/P&gt;

&lt;P&gt;sourcetype="source" RequestURI="/ping" |table _time,host,RequestURI| sendemail to=&lt;A href="mailto:abc@abc.com" target="_blank"&gt;abc@abc.com&lt;/A&gt; server=smtp_server sendresults=true format=html inline=true &lt;/P&gt;

&lt;P&gt;Choose a timeperiod where you have result.&lt;/P&gt;

&lt;P&gt;Let us know if you get the email for the result.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 14:37:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40965#M494</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2020-09-28T14:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40966#M495</link>
      <description>&lt;P&gt;I found something. Could you try this search instead of the one you are using. The earliest one is not sending any mail as it doesn't have a condition to match the result.&lt;/P&gt;

&lt;P&gt;sourcetype="source"|table _time,host,RequestURI|where RequestURI="/ping"&lt;/P&gt;

&lt;P&gt;Configure this in the alert it will work for sure. Other configurations are correct.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 11:22:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40966#M495</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2013-08-21T11:22:01Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40967#M496</link>
      <description>&lt;P&gt;Here's a thought: you could consider integrate Splunk with Nagios passive checks and rely on that engine to handle the actual alerting.  I have not done it myself, but I know it has been done.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 11:47:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40967#M496</guid>
      <dc:creator>grijhwani</dc:creator>
      <dc:date>2013-08-21T11:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40968#M497</link>
      <description>&lt;P&gt;the SMTP server we use requires authentication. Doesn't look like the &lt;CODE&gt;sendemail&lt;/CODE&gt; command supports authentication.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 12:32:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40968#M497</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T12:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Real time alerts</title>
      <link>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40969#M498</link>
      <description>&lt;P&gt;Nope. Still not. Search is &lt;CODE&gt;sourcetype="mysourcetype" | table _time RequestURI | where RequestURI="/ping"&lt;/CODE&gt;. If I run the search from the drop-down, I see the result. No alert is fired (i.e. no email or no event in the alert manager)&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2013 12:40:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Real-time-alerts/m-p/40969#M498</guid>
      <dc:creator>brettcave</dc:creator>
      <dc:date>2013-08-21T12:40:55Z</dc:date>
    </item>
  </channel>
</rss>

