Alerting

Alerts timing

poddraj
Explorer

Hi

 

I am trying to create an alert when there are more than 10 login attempt failures by same user in last 15 mins. I have scheduled my cron to run for every 15 mins

However, I have a scenario where there were 8 login failures at 8:59 and another 5 at 9:01 for same user
if we run the cron at 9 and 9:15, neither of them would alert.

Is it possible to manipulate some of splunk's alert options to get the behavior I want?
Labels (2)
0 Karma

The_Simko
Path Finder

It's a matter of defining your boundaries, and what your goals are.
One way to do what you want is to run the alert every 5 minutes for the previous 15 minutes.  That way your condition will be less likely to be missed.
  
Now, you will get some duplicate alerts. You can either just accept it as the cost of being vigilant, or you could do something fancy like write the box name or account name (or both) to a lookup, then query that to make sure it hasn't fired already before sending the alert.  

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...