Alerting

Custom alert will not work

calejohn5
Explorer

Hello, I have struggled with alerting a specific search I've made.  

EVENT_TYPE="Login" LOGIN_STATUS=*
[search EVENT_TYPE="Login" LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"
| stats count by USER_ID
| table USER_ID]
| stats latest(LOGIN_STATUS) AS LOGIN_STATUS
latest(USER_NAME) AS USER_NAME
latest(UserAccountId) AS "Account Id"
latest(USER_TYPE) AS "User Type"
latest(TIMESTAMP) AS "Time stamp" by USER_ID
| where LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"

Which results in this

Screenshot (116).png


I have tried number of results > 0
search USER_ID> 0
I tried using field tokens such as $RESULT.userid$ > 0 

Does anyone know how I can edit my search or trigger to actually trigger when I receive results?

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I've found triggering the alert when the number of results is not zero works best in most cases.

What alert action are you using?  Have you checked the Triggered Alerts page to verify the alert did not trigger?

---
If this reply helps you, Karma would be appreciated.
0 Karma

calejohn5
Explorer

For my other alerts that worked, for some reason this one refuses to set off.  It's like it doesn't recognize the results as results.
I'm using an email alert to my email and checked my triggered alerts page, I did not see it on there.

0 Karma
Get Updates on the Splunk Community!

March Community Office Hours Security Series Uncovered!

Hello Splunk Community! In March, Splunk Community Office Hours spotlighted our fabulous Splunk Threat ...

Stay Connected: Your Guide to April Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars in April. This post ...

Want to Reduce Costs, Mitigate Risk, Improve Performance, or Increase Efficiencies? ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...