Alerting

How to raise a Splunk alert notification for every event in a log?

akhilesh_chavva
New Member

Our requirement is to raise a Splunk notification to EVERY EVENT. How to achieve this?

Elaborate explanation: Consider below two entries are two events
xxx.xx.xx.xxx - - [01/Jul/2009:12:05:27 -0700] "GET /
  trade/app?action=logout HTTP/1.1" 200 2953
xxx.xx.xx.xxx - - [01/Jul/2009:12:04:30 -0700] "GET /
  trade/app?action=logout HTTP/1.1" 200 2953

I would like to raise a Splunk notification (in our case its ticket) for above two events (strictly speaking all the events).

Any suggestion would be appreciated.

Tags (2)
0 Karma

martin_mueller
SplunkTrust
SplunkTrust

You could schedule an alert searching for index=yourdata and configure your alert actions accordingly. That would alert whenever there's data in that index with no further filtering.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability Synthetic Monitoring - Resolved Incident on Detector Alerts

We’ve discovered a bug that affected the auto-clear of Synthetic Detectors in the Splunk Synthetic Monitoring ...

Video | Tom’s Smartness Journey Continues

Remember Splunk Community member Tom Kopchak? If you caught the first episode of our Smartness interview ...

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud?

3-2-1 Go! How Fast Can You Debug Microservices with Observability Cloud? Learn how unique features like ...