Alerting

How to create an alert triggered by updated log data?

prakashv546
New Member

I am creating an alert. When alert is triggered, i want only the updated data in log file instead of entire log file, without using script.
I am using Splunk in Windows server 2012 R2.

Tags (2)
0 Karma

dineshraj9
Builder

You search should be able to filter the events which triggered the alert. In the alert settings, check on include results(csv, pdf, inline) and save. It should show you the events which triggered the alert.

0 Karma

prakashv546
New Member

I am looking for the data which triggered the alert..

0 Karma

koshyk
Super Champion

not understood what you mean by "I want only the updated data". You want a report to be sent from the log file? how do you define the alert? you looking for data which caused the alert to trigger?

Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...