Alerting

Configuring Alerts

MichaelBernas
New Member

Hello,

I have been using splunk as a syslog server for a while now and have around 8 - 10 alerts tat I have created. I have recently had issues with creating any additional alerts and have pretty much determined that it is because I have hit a limit on how many real time alerts I have setup.

I am now going through all my alerts to see which ones I don't need to have real time alerting on. My question is this. I want to perform a search every 5 minutes...if a search comes up with a specific search string within that 5 minutes, I would like it to alert once for every time it is found.

Is this achieved just by setting up a basic schedule as well as setting the time range? And would I do something like having the start time at -5m and the finish time to now?

Thanks for your help....

Tags (1)
0 Karma

jtrucks
Splunk Employee
Splunk Employee

Set up the search to run every five minutes, with the time interval as:

Start time: -5m@m Finish time: now

Next, Set "Alert mode" to "Once per result" to get a separate alert per result found rather than a single alert for the whole search across the 5 minutes.

Just be sure to set it up to send email and you are set.

--
Jesse Trucks
Minister of Magic
0 Karma

MichaelBernas
New Member

Thanks jtrucks,

I had set the start time to -5m. What is the difference between what I set and -5m@m.

I appreciate the help!

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Built-in Service Level Objectives Management to Bridge the Gap Between Service & ...

Wednesday, May 29, 2024  |  11AM PST / 2PM ESTRegister now and join us to learn more about how you can ...

Get Your Exclusive Splunk Certified Cybersecurity Defense Engineer Certification at ...

We’re excited to announce a new Splunk certification exam being released at .conf24! If you’re headed to Vegas ...