Splunk Search

Fire Alert Based on Stats

trever
Loves-to-Learn

I have a stats query that I would like to fire only when a new value for a field comes in. I have my alert set up like this:

alt text

I can run the search in the alert and I see values, but the alert does not fire, what do I have set up wrong?

0 Karma

jadengoho
Builder

is your Email server setup ?
Settings > Server Settings > Email Settings?

Also can all actions on the alert to monitor if it triggers on the Activity > Triggered activity

0 Karma

trever
Loves-to-Learn

Yes my email server is set up.

It says "There are no fired events for this alert"

0 Karma

trever
Loves-to-Learn

Activity > Triggered Alerts shows "No triggered alerts found"

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...