Alerting

Can we push data to summary index each time search runs and also when condition is met?

vrmandadi
Builder

Hello,

I have a alert which is scheduled to run every 10 minutes and triggers and alert if the number of events is greater than 0.Is there a way where we can push the data to summary index not just when the condition is met but everytime the search runs(10 minutes for this search) to store in the summary index.

I am using the below summary index to push data

| collect index="abc_summary" marker="report=abc_alerts" testmode=f addtime=t

Tags (2)
0 Karma

mattymo
Splunk Employee
Splunk Employee

Hi vrmandadi!

Once you sechedule any search (an alert is just a scheduled search too!), you can go to settings > searches, reports & alerts > edit to control summary indexing options:

alt text

alt text

Collect also works appended to a scheduled search, but can be tricky to manage and can result in unwanted runs of the command. Check it out and let us know if this works for you!

http://docs.splunk.com/Documentation/SplunkCloud/latest/Knowledge/Usesummaryindexing#Set_up_summary_...

- MattyMo
0 Karma
Get Updates on the Splunk Community!

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Get Inspired! We’ve Got Validation that Your Hard Work is Paying Off

We love our Splunk Community and want you to feel inspired by all your hard work! Eric Fusilero, our VP of ...

What's New in Splunk Enterprise 9.4: Features to Power Your Digital Resilience

Hey Splunky People! We are excited to share the latest updates in Splunk Enterprise 9.4. In this release we ...