Alerting

Alert did not triggered on events

pawan_gupta
New Member

We have an alert setup on splunk which runs on every 5 min interval and triggers the email alert action if matching result count is more than 0.
One day, we had the matching events in our app log. However, the alert did not get triggered on that day.
When we checked the internal logs, we found that the alert query ran without any issue but the outcome result for that query was 0 hence the alert did not triggered.
However, when we ran the query directly in splunk for same time window, we found the matching events.
i checked the app log logging and indexed time and there was max delay of 2 sec.

Can you give some insight why the alert query did not picked the matching events on that particular day?

Tags (1)
0 Karma

thirulog
New Member

I have earliest -2 d to latest now

*/5 * * * *

but still no email alert

did any one have success in the cron schedule

0 Karma

DalJeanis
Legend

My expectation is that the alert ran in between the time the event happened and the time it was indexed.

Try earliest=-6m latest=-1m, or earliest=-310s latest=-10s, or some similar combination. You could also have some overlap if you wanted, with earliest=-310s latest=now, depending on how time-sensitive the alert is.

0 Karma
Get Updates on the Splunk Community!

Fueling your curiosity with new Splunk ILT and eLearning courses

At Splunk Education, we’re driven by curiosity—both ours and yours! That’s why we’re committed to delivering ...

Splunk AI Assistant for SPL 1.1.0 | Now Personalized to Your Environment for Greater ...

Splunk AI Assistant for SPL has transformed how users interact with Splunk, making it easier than ever to ...

Unleash Unified Security and Observability with Splunk Cloud Platform

     Now Available on Microsoft AzureOn Demand Now Step boldly into the AI revolution with enhanced security ...