Alerting

Custom alert will not work

calejohn5
Explorer

Hello, I have struggled with alerting a specific search I've made.  

EVENT_TYPE="Login" LOGIN_STATUS=*
[search EVENT_TYPE="Login" LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"
| stats count by USER_ID
| table USER_ID]
| stats latest(LOGIN_STATUS) AS LOGIN_STATUS
latest(USER_NAME) AS USER_NAME
latest(UserAccountId) AS "Account Id"
latest(USER_TYPE) AS "User Type"
latest(TIMESTAMP) AS "Time stamp" by USER_ID
| where LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"

Which results in this

Screenshot (116).png


I have tried number of results > 0
search USER_ID> 0
I tried using field tokens such as $RESULT.userid$ > 0 

Does anyone know how I can edit my search or trigger to actually trigger when I receive results?

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I've found triggering the alert when the number of results is not zero works best in most cases.

What alert action are you using?  Have you checked the Triggered Alerts page to verify the alert did not trigger?

---
If this reply helps you, Karma would be appreciated.
0 Karma

calejohn5
Explorer

For my other alerts that worked, for some reason this one refuses to set off.  It's like it doesn't recognize the results as results.
I'm using an email alert to my email and checked my triggered alerts page, I did not see it on there.

0 Karma
Get Updates on the Splunk Community!

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...

Splunk App Dev Community Updates – What’s New and What’s Next

Welcome to your go-to roundup of everything happening in the Splunk App Dev Community! Whether you're building ...

The Latest Cisco Integrations With Splunk Platform!

Join us for an exciting tech talk where we’ll explore the latest integrations in Cisco + Splunk! We’ve ...