Splunk Search

Fire Alert Based on Stats

trever
Loves-to-Learn

I have a stats query that I would like to fire only when a new value for a field comes in. I have my alert set up like this:

alt text

I can run the search in the alert and I see values, but the alert does not fire, what do I have set up wrong?

0 Karma

jadengoho
Builder

is your Email server setup ?
Settings > Server Settings > Email Settings?

Also can all actions on the alert to monitor if it triggers on the Activity > Triggered activity

0 Karma

trever
Loves-to-Learn

Yes my email server is set up.

It says "There are no fired events for this alert"

0 Karma

trever
Loves-to-Learn

Activity > Triggered Alerts shows "No triggered alerts found"

0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...