<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How do I get the event associated to a fired_alert? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346835#M165359</link>
    <description>&lt;P&gt;I run this search:   index=_audit action=fired_alert&lt;/P&gt;

&lt;P&gt;I get back this which looks like properties of the alert.&lt;BR /&gt;
Audit:[timestamp=11-08-2017 06:52:57.231, id=35143213, user=admin, action=alert_fired, ss_user="nobody", ss_app="search", ss_name="RDP by GenericID Prod", sid="rt_scheduler_&lt;EM&gt;admin&lt;/EM&gt;&lt;EM&gt;search&lt;/EM&gt;_RMD5cf6dac5adc7385e1_at_1510141830_38328.0", alert_actions="email,notable,resilient", severity=3, trigger_time=1510141971, expiration=1510228377, digest_mode=0, triggered_alerts=1][OhxQLHMR0bgxLAaqfsIRoIsoknIp5H1APZ24P4Hm/9FDp8O0VT46WEsP+yLAPbuHYNBkjd8X2/Lu4tVXmqLy+d738KZDjCqFTCu9WcwwILDA97uAfDes/bqw0KamiumItENPlXSQkZIGLfuULHuVoBWOdWrIDF5MMp2y19XsXps=]&lt;/P&gt;

&lt;P&gt;The search for the alert looks like this:&lt;BR /&gt;
index="wineventlog" EventCode=4648 Logon_ID=0x3e7 Process_Name="C:\Windows\System32\winlogon.exe" [ | inputlookup serts-prod.csv | rename genid as user_identity | table user_identity] | eval discovered_date=ceil(_time) * 1000| fields host, user, Account_Domain, discovered_date&lt;/P&gt;

&lt;P&gt;How do I get values in the field statement? it should be my username, my workstation and my logon domain.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 16:35:48 GMT</pubDate>
    <dc:creator>pfabrizi</dc:creator>
    <dc:date>2020-09-29T16:35:48Z</dc:date>
    <item>
      <title>How do I get the event associated to a fired_alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346835#M165359</link>
      <description>&lt;P&gt;I run this search:   index=_audit action=fired_alert&lt;/P&gt;

&lt;P&gt;I get back this which looks like properties of the alert.&lt;BR /&gt;
Audit:[timestamp=11-08-2017 06:52:57.231, id=35143213, user=admin, action=alert_fired, ss_user="nobody", ss_app="search", ss_name="RDP by GenericID Prod", sid="rt_scheduler_&lt;EM&gt;admin&lt;/EM&gt;&lt;EM&gt;search&lt;/EM&gt;_RMD5cf6dac5adc7385e1_at_1510141830_38328.0", alert_actions="email,notable,resilient", severity=3, trigger_time=1510141971, expiration=1510228377, digest_mode=0, triggered_alerts=1][OhxQLHMR0bgxLAaqfsIRoIsoknIp5H1APZ24P4Hm/9FDp8O0VT46WEsP+yLAPbuHYNBkjd8X2/Lu4tVXmqLy+d738KZDjCqFTCu9WcwwILDA97uAfDes/bqw0KamiumItENPlXSQkZIGLfuULHuVoBWOdWrIDF5MMp2y19XsXps=]&lt;/P&gt;

&lt;P&gt;The search for the alert looks like this:&lt;BR /&gt;
index="wineventlog" EventCode=4648 Logon_ID=0x3e7 Process_Name="C:\Windows\System32\winlogon.exe" [ | inputlookup serts-prod.csv | rename genid as user_identity | table user_identity] | eval discovered_date=ceil(_time) * 1000| fields host, user, Account_Domain, discovered_date&lt;/P&gt;

&lt;P&gt;How do I get values in the field statement? it should be my username, my workstation and my logon domain.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:35:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346835#M165359</guid>
      <dc:creator>pfabrizi</dc:creator>
      <dc:date>2020-09-29T16:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: How do I get the event associated to a fired_alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346836#M165360</link>
      <description>&lt;P&gt;You have the SID of the search that triggered the alert -rt_scheduler_&lt;EM&gt;admin&lt;/EM&gt;&lt;EM&gt;search&lt;/EM&gt;_RMD5cf6dac5adc7385e1_at_1510141830_38328.0 &lt;/P&gt;

&lt;P&gt;Then use one of the endpoints (/services/search/jobs, /services/search/jobs/{search_id}/results) to get the search results using the SID.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:39:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346836#M165360</guid>
      <dc:creator>akheraj_splunk</dc:creator>
      <dc:date>2020-09-29T16:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: How do I get the event associated to a fired_alert?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346837#M165361</link>
      <description>&lt;P&gt;I did this, but not sure this is the best approach.&lt;BR /&gt;
"search index=_audit action=alert_fired earliest=startingDate  latest=endingDate  | map search=" |loadjob sid"&lt;/P&gt;

&lt;P&gt;I use a starting and ending date so I am only searching on a time frame when the alert happened and not the entire time frame.&lt;/P&gt;

&lt;P&gt;I am using the C# SDK, but is what you listed above a more efficient method?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 16:45:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-do-I-get-the-event-associated-to-a-fired-alert/m-p/346837#M165361</guid>
      <dc:creator>pfabrizi</dc:creator>
      <dc:date>2020-09-29T16:45:00Z</dc:date>
    </item>
  </channel>
</rss>

