Alerting

Custom alert will not work

calejohn5
Explorer

Hello, I have struggled with alerting a specific search I've made.  

EVENT_TYPE="Login" LOGIN_STATUS=*
[search EVENT_TYPE="Login" LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"
| stats count by USER_ID
| table USER_ID]
| stats latest(LOGIN_STATUS) AS LOGIN_STATUS
latest(USER_NAME) AS USER_NAME
latest(UserAccountId) AS "Account Id"
latest(USER_TYPE) AS "User Type"
latest(TIMESTAMP) AS "Time stamp" by USER_ID
| where LOGIN_STATUS="LOGIN_ERROR_PASSWORD_LOCKOUT"

Which results in this

Screenshot (116).png


I have tried number of results > 0
search USER_ID> 0
I tried using field tokens such as $RESULT.userid$ > 0 

Does anyone know how I can edit my search or trigger to actually trigger when I receive results?

Labels (3)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

I've found triggering the alert when the number of results is not zero works best in most cases.

What alert action are you using?  Have you checked the Triggered Alerts page to verify the alert did not trigger?

---
If this reply helps you, Karma would be appreciated.
0 Karma

calejohn5
Explorer

For my other alerts that worked, for some reason this one refuses to set off.  It's like it doesn't recognize the results as results.
I'm using an email alert to my email and checked my triggered alerts page, I did not see it on there.

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...