Alerting

How can I get an alert Trigger action, to log the data that triggers it as the log event > event text?

jjlandauer
New Member

I have an alert based on application logs of a web application. This alert fires based on data generated by user activity. For example, if a user is using the application from more than one IP an alert is triggered. I would like to use the alert action log event to log the alert and the data that triggered it. If I add $name$ to the event text, the name of the alert is logged. But how can I get the data that triggered the alert, the 1 username and 2 ip address, to be logged under the alert?

Tags (1)
0 Karma
1 Solution

HiroshiSatoh
Champion

In the case of this alert

(your search)|stats dc(ip) as count,values(ip) as ip by user|where count >1

You can embed ” $result.ip$”

View solution in original post

0 Karma

HiroshiSatoh
Champion

In the case of this alert

(your search)|stats dc(ip) as count,values(ip) as ip by user|where count >1

You can embed ” $result.ip$”

0 Karma

jjlandauer
New Member

Thank you!!! This worked perfectly!! How did you know this though? Is there a place this is documented? I searched!!!

0 Karma

HiroshiSatoh
Champion

There is a document about tokens. The search statement is an experience.
Please enjoy Splunk.

https://docs.splunk.com/Documentation/Splunk/7.2.5/Alert/EmailNotificationTokens

0 Karma
Get Updates on the Splunk Community!

Harnessing Splunk’s Federated Search for Amazon S3

Managing your data effectively often means balancing performance, costs, and compliance. Splunk’s Federated ...

Infographic provides the TL;DR for the 2024 Splunk Career Impact Report

We’ve been buzzing with excitement about the recent validation of Splunk Education! The 2024 Splunk Career ...

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...