Splunk Search

Fire Alert Based on Stats

trever
Loves-to-Learn

I have a stats query that I would like to fire only when a new value for a field comes in. I have my alert set up like this:

alt text

I can run the search in the alert and I see values, but the alert does not fire, what do I have set up wrong?

0 Karma

jadengoho
Builder

is your Email server setup ?
Settings > Server Settings > Email Settings?

Also can all actions on the alert to monitor if it triggers on the Activity > Triggered activity

0 Karma

trever
Loves-to-Learn

Yes my email server is set up.

It says "There are no fired events for this alert"

0 Karma

trever
Loves-to-Learn

Activity > Triggered Alerts shows "No triggered alerts found"

0 Karma
Get Updates on the Splunk Community!

Splunk Classroom Chronicles: Training Tales and Testimonials (Episode 4)

Welcome back to Splunk Classroom Chronicles, our ongoing series where we shine a light on what really happens ...

From GPU to Application: Monitoring Cisco AI Infrastructure with Splunk Observability ...

AI workloads are different. They demand specialized infrastructure—powerful GPUs, enterprise-grade networking, ...

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...