How to raise a Splunk alert notification for every event in a log?

New Member

Our requirement is to raise a Splunk notification to EVERY EVENT. How to achieve this?

Elaborate explanation: Consider below two entries are two events - - [01/Jul/2009:12:05:27 -0700] "GET /
  trade/app?action=logout HTTP/1.1" 200 2953 - - [01/Jul/2009:12:04:30 -0700] "GET /
  trade/app?action=logout HTTP/1.1" 200 2953

I would like to raise a Splunk notification (in our case its ticket) for above two events (strictly speaking all the events).

Any suggestion would be appreciated.

Tags (2)
0 Karma


You could schedule an alert searching for index=yourdata and configure your alert actions accordingly. That would alert whenever there's data in that index with no further filtering.

0 Karma
State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!