I have about 80 devices logging to Splunk and am in the process of trying to setup alerting for them. I would like for alerts to go off individually for each device when a event occurs. Is this possible without setting up alerts specific for each device? i.e. I have a search that runs every 5 minutes looking at the logs for the previous 6 minutes with:
sourcetype=fortinet type=event status=failed and a custom condition of | stats count(Mgmt_IP) as attempts by devname | where attempts > 2
so that I am only looking at devices with a frequency of more than 2 login failures in the last 6 minutes. I know if I say devname=X in the search this will work, but I'd like to avoid having to create hundreds of alerts.
Currently this is not possible - we are working on per result alerting and you should get your hands on it during our next major release (going into beta soon). In the mean time you can either process the search results inside your script (if using scripted alerts) or modify the sendemail search command to send out one email per result, see this for more info on how to modify sendemail