Alerting

Result files disappearing

lain179
Communicator

Hi,

I am creating a splunk alert trigger script which parses the output csv file. I am having a problem because the result file keeps disappearing. The trigger passes in the full path to csv file as one of the parameters. Sometimes my script is fast enough to read the file before it disappears, and sometimes it results in file not found. Why is that happening?

C://Program Files//Splunk//var//run//splunk//dispatch//rt_scheduler__admin__search__RMD5d51449b036e37dfe_at_1367973103_9662.290//results.csv.gz

Thanks

Tags (1)
0 Karma
1 Solution

OL
Communicator

You might want to try the following option in your saved search definition:

dispatch.ttl = [p]
* Indicates the time to live (in seconds) for the artifacts of the scheduled search, if no
actions are triggered.

Hope it will help.

Regards,
Olivier

View solution in original post

OL
Communicator

You might want to try the following option in your saved search definition:

dispatch.ttl = [p]
* Indicates the time to live (in seconds) for the artifacts of the scheduled search, if no
actions are triggered.

Hope it will help.

Regards,
Olivier

Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...