Alerting

how to run a second search based on an alert that has already been trigged

Ruben_sb1
Explorer

Hi everyone.
I try to explain you.

For example:
I can detect when a user has been connected form a X country, in this moment splunk send me a email, and I need to starting a investigation to determinate if that event is known.

My question is:

How can i configure a second search when that alert has been trigged?

I would like Splunk run a search whit the information that it got from the alert.

I wouldn’t like to modify my original search because if a add this second search in my firs search My performance could be affected,

 

thanks and regards.

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Ruben_sb1,

you could save the results of the Alert's search in a lookup or (better) in a summary index.

So you have an index that contains all the fired alerts to use for your searches, dashboards and alerts.

You can easily reach this adding an action to your alert (Save in Lookup) or  (I usually prefer this solution) adding at the end of your alert "| collect index=my_summary_alerts_index".

Ciao.

Giuseppe

 

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...