As with many features of Splunk, alerts are powered by underlying searches. These underlying searches can either run on a schedule against historically indexed data or run against real-time data as it flows into Splunk. Alerts can then be triggered every time a search runs or when certain search conditions are met.
Additionally, all alerting in Splunk can be throttled so that alerts do not continuously fire if similar conditions are met repeatedly, and this will be covered later in the chapter.