Monitor triggered alerts
Add an alert to a list of triggered alerts. Review triggered alerts by app context, owner, and severity level.
Add an alert to the Triggered Alerts list
- Use one of the following options depending on whether you are creating a new alert or editing an existing alert.
Option Steps Create a new alert From the Search page in the Search and Reporting app, select Save As > Alert. Enter alert details and configure triggering and throttling as needed. Edit an existing alert From the Alerts page in the Search and Reporting app, select Edit>Edit actions for an existing alert.
- From the Add Actions menu, select Add to triggered alerts.
- Select an alert Severity level.
Severity levels are informational only. They are used to group alerts in the Triggered Alerts list. The default level is Medium.
- Click Save.
Reviewing recently triggered alerts
You can see records of recently triggered alerts from the Triggered Alerts page or from an Alert Details page. The Triggered Alerts page shows all instances of triggered alerts. See Review triggered alerts for more information on viewing and interpreting triggered alerts.
Records of triggered alert details are available for twenty-four hours by default. See Update triggered alert lifespans for information on changing the expiration setting for an individual alert.
Run a script alert action
This documentation applies to the following versions of Splunk Cloud Platform™: 8.2.2203, 8.2.2105, 8.1.2103, 8.2.2106, 8.2.2107, 8.2.2109, 8.2.2111, 8.2.2112, 8.2.2201 (latest FedRAMP release), 8.2.2202