Splunk® Enterprise

Alerting Manual

Acrobat logo Download manual as PDF


Splunk Enterprise version 7.1 is no longer supported as of October 31, 2020. See the Splunk Software Support Policy for details. For information about upgrading to a supported version, see How to upgrade Splunk Enterprise.
This documentation does not apply to the most recent version of Splunk® Enterprise. For documentation on the most recent version, go to the latest release.
Acrobat logo Download topic as PDF

Additional alert configuration options

It is recommended to create alerts in the Search page and edit them from the Alerts page. In rare cases, authorized users might access the Searches, reports, and alerts page for the following configurations.


Enable summary indexing

Summary indexing is available on scheduled alerts. It can help you perform analysis or report on large amounts of data over long time ranges. Typically, this is time consuming and can impact performance if several users are running similar searches on a regular basis.

Prerequisites
Ensure that the alert's search generates statistical or summary data.

Steps

  1. Using the top-level navigation bar, select Settings > Searches, Reports, and Alerts.
  2. Select the alert to open the alert detail page.
  3. To enable the summary index to gather data on a regular interval, set Alert condition to '"Always".
  4. For a scheduled alert, select Enable under Summary Indexing. If not already specified, this sets the Alert condition to "Always". This option is not available for real-time alerts.
  5. Click Save.

Searches and summary indexing

To use summary indexing with an alert, create a search that computes statistics or a summary for events over a period of time. Search results are saved into a summary index that you designate. You can search over this smaller summary index instead of working with the larger original dataset.

It is typical to use reporting commands in a search that populates a summary index. See Use summary indexing for increased reporting efficiency in the Knowledge Manager manual.



Configure triggered alert expiration

By default, each alert trigger record on the Triggered Alerts page expires after seven days. Here are steps for updating triggered alert expiration. These steps apply only to alerts with the "Add to Triggered Alerts" action enabled.

  1. From the top-level navigation bar, select Settings > Searches, reports, and alerts.
  2. Locate the alert that you want to modify under Search Name.
  3. Select Advanced Edit.
  4. Scroll down to alert.expires.
  5. Enter an integer and specify one of the following units: seconds (s), minutes (m), hours (h), days (d).
    For example, to set the alert to expire in 3 days, specify 3d.
  6. Click Save.
Last modified on 15 February, 2019
PREVIOUS
Triggered alerts
  NEXT
Alert examples

This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.2.0, 7.2.1, 7.2.2, 7.2.3


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters