Configure alerts in savedsearches.conf
You can use Splunk Web to configure most alerts. If you have Splunk Enterprise, you can configure alerts by editing
savedsearches.conf. Before configuring an alert with
savedsearches.conf, review the following topics in the Admin Manual.
Configuration file paths
Create or edit savedsearches.conf in the local directory.
For apps, create or edit savedsearches.conf in the application directory.
Example savedsearches.conf stanza
Alerts use a saved search to look for events. savedsearches.conf contains a stanza for each saved search. The following example shows the stanza for a saved search with its alert action settings. In this case, the alert sends an email notification when it triggers.
[Too Many Errors Today] # send an email notification action.email = 1 action.email.message.alert = The alert condition for '$name$' in the $app$ fired with $job.resultCount$ error events. action.email.to = email@example.com action.email.useNSSubject = 1 alert.suppress = 0 alert.track = 0 counttype = number of events quantity = 5 relation = greater than # run every day at 14:00 cron_schedule = 0 14 * * * #search for results in the last day dispatch.earliest_time = -1d dispatch.latest_time = now display.events.fields = ["host","source","sourcetype","latitude"] display.page.search.mode = verbose display.visualizations.charting.chart = area display.visualizations.type = mapping enableSched = 1 request.ui_dispatch_app = search request.ui_dispatch_view = search search = index=_internal " error " NOT debug source=*splunkd.log* earliest=-7d latest=now disabled = 1
For more information, see the
savedsearches.conf example in the Admin Manual.
Configure a script for an alert action
This documentation applies to the following versions of Splunk® Enterprise: 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.5.0, 6.5.1, 6.5.1612 (Splunk Cloud only), 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.6.0, 6.6.1, 6.6.2, 6.6.3