Alerting

how to run a second search based on an alert that has already been trigged

Ruben_sb1
Explorer

Hi everyone.
I try to explain you.

For example:
I can detect when a user has been connected form a X country, in this moment splunk send me a email, and I need to starting a investigation to determinate if that event is known.

My question is:

How can i configure a second search when that alert has been trigged?

I would like Splunk run a search whit the information that it got from the alert.

I wouldn’t like to modify my original search because if a add this second search in my firs search My performance could be affected,

 

thanks and regards.

Labels (2)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Ruben_sb1,

you could save the results of the Alert's search in a lookup or (better) in a summary index.

So you have an index that contains all the fired alerts to use for your searches, dashboards and alerts.

You can easily reach this adding an action to your alert (Save in Lookup) or  (I usually prefer this solution) adding at the end of your alert "| collect index=my_summary_alerts_index".

Ciao.

Giuseppe

 

0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...