Alerting

Splunk cloud light: Why does a real-time alert not seem to send any email, but it appears in the triggered alerts log?

marick
New Member

A real-time alert that looks for 0 events in the last N minutes does not seem to send any email. It does put entries in the triggered alerts log.

The alert contains this data:

trigger condition: "Number of Results is = 0 in 5 minutes."
search condition: processed customer=32323 sourcetype="splunktest-too_small"

We have another alert that triggers whenever "fire_alert" appears in the log. When I trigger that alert, I see index=_internal log spewage of the form

... savedsearch_name="fire_alert", status=success, digest_mode=0, scheduled_time=1442592619, window_time=0, dispatch_time=1442592620, run_time=1830.371, result_count=1, alert_actions="email", ...

There is no similar line in the log when the first real-time alert is triggered.

0 Karma

mosman_splunk
Splunk Employee
Splunk Employee

check your alert_actions.conf and make sure your either you have the correct username and passwrod or your SMTP is white listing you .
good luck

0 Karma

jterry
Splunk Employee
Splunk Employee

hard to say. there may be something wrong w/the mail server or mail config.
try searching for: "index=_internal ERROR"

0 Karma

muebel
SplunkTrust
SplunkTrust

can you add the config from savedsearches.conf? Maybe something is off with the email config. Are you able to use the send email action for any alerts at all?

Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...