Alerting

How to make changes from the GitLab server (not from Splunk Web) to track changes for a Splunk configuration file?

ngwodo
Path Finder

Splunk alerts are being quarantined from an invalid sender. What backend files need to be modified?  How can I make changes from the GitLab server (not from Splunk Web) to track changes for a Splunk configuration file: savedsearches.conf for an invalid email sender?

Labels (2)
0 Karma

thambisetty
SplunkTrust
SplunkTrust
  1. From the Search and Reporting app home page, select Settings > Server settings > Email settings.
  2. Select Mail Server Settings.

you see from field, update from address there.

————————————
If this helps, give a like below.
0 Karma

ngwodo
Path Finder

I am talking about doing it from Linux command line. 

0 Karma

ngwodo
Path Finder

I noticed a large number of Splunk alerts in the hosted O365 quarantine (not delivered) because they are using an invalid sender "From: splunk-s". This is not a problem with the tenant configuration where we can whitelist it. O365 needs to see a properly formatted “from” header, e.g. somebody@gmail.com. Is this something that can be adjusted in the Splunk config? It would also be beneficial to remove some of the old recipients from these alerts:

0 Karma

thambisetty
SplunkTrust
SplunkTrust

can you elaborate you question?

————————————
If this helps, give a like below.
0 Karma

ngwodo
Path Finder

Please can you tell how I can make changes from gitlab server to track changes for a Splunk configuration file: savedsearches.conf for an invalid email sender?  Please I need the step by step process on how to do it. We need to do it from gitlab not from splunk web.

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...