Alerting

Splunk cloud light: Why does a real-time alert not seem to send any email, but it appears in the triggered alerts log?

marick
New Member

A real-time alert that looks for 0 events in the last N minutes does not seem to send any email. It does put entries in the triggered alerts log.

The alert contains this data:

trigger condition: "Number of Results is = 0 in 5 minutes."
search condition: processed customer=32323 sourcetype="splunktest-too_small"

We have another alert that triggers whenever "fire_alert" appears in the log. When I trigger that alert, I see index=_internal log spewage of the form

... savedsearch_name="fire_alert", status=success, digest_mode=0, scheduled_time=1442592619, window_time=0, dispatch_time=1442592620, run_time=1830.371, result_count=1, alert_actions="email", ...

There is no similar line in the log when the first real-time alert is triggered.

0 Karma

mosman_splunk
Splunk Employee
Splunk Employee

check your alert_actions.conf and make sure your either you have the correct username and passwrod or your SMTP is white listing you .
good luck

0 Karma

jterry
Splunk Employee
Splunk Employee

hard to say. there may be something wrong w/the mail server or mail config.
try searching for: "index=_internal ERROR"

0 Karma

muebel
SplunkTrust
SplunkTrust

can you add the config from savedsearches.conf? Maybe something is off with the email config. Are you able to use the send email action for any alerts at all?

Get Updates on the Splunk Community!

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

A Guide To Cloud Migration Success

As enterprises’ rapid expansion to the cloud continues, IT leaders are continuously looking for ways to focus ...