Alerting

Custom alert will not work

calejohn5
Explorer

Hello, I have struggled with alerting a specific search I've made.  

EVENT_TYPE="Login" LOGIN_STATUS=*
[search EVENT_TYPE="Login" LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"
| stats count by USER_ID
| table USER_ID]
| stats latest(LOGIN_STATUS) AS LOGIN_STATUS
latest(USER_NAME) AS USER_NAME
latest(UserAccountId) AS "Account Id"
latest(USER_TYPE) AS "User Type"
latest(TIMESTAMP) AS "Time stamp" by USER_ID
| where LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"

Which results in this

Screenshot (116).png


I have tried number of results > 0
search USER_ID> 0
I tried using field tokens such as $RESULT.userid$ > 0 

Does anyone know how I can edit my search or trigger to actually trigger when I receive results?

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I've found triggering the alert when the number of results is not zero works best in most cases.

What alert action are you using?  Have you checked the Triggered Alerts page to verify the alert did not trigger?

---
If this reply helps you, Karma would be appreciated.
0 Karma

calejohn5
Explorer

For my other alerts that worked, for some reason this one refuses to set off.  It's like it doesn't recognize the results as results.
I'm using an email alert to my email and checked my triggered alerts page, I did not see it on there.

0 Karma
Get Updates on the Splunk Community!

SOC4Kafka - New Kafka Connector Powered by OpenTelemetry

The new SOC4Kafka connector, built on OpenTelemetry, enables the collection of Kafka messages and forwards ...

Your Voice Matters! Help Us Shape the New Splunk Lantern Experience

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Building Momentum: Splunk Developer Program at .conf25

At Splunk, developers are at the heart of innovation. That’s why this year at .conf25, we officially launched ...