Alerting

Splunk Alerting

praneethlekkala
Path Finder

I am trying to create a splunk alert, which sends an email if a key value is missing.

 

host="myhost" sourcetype="access_log" "Key_Word in the access logs'"

Usually i get the log entries every 30 mins, i want to get alerted via an email if "Key_Word in the access logs" is missing from the access logs, can someone guide me on this?

Labels (1)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @praneethlekkala,

it's easy:

  • open the app where you want to locate your alert,
  • open search form,
  • run your search, using the time range you want in the alert (e.g. last 30 minutes),
  • click on "Save as" and then "Alert",
  • insert the infos requested in the form:
    • alert title,
    • permissions "Shared in App",
    • scheduled: "Run on cron schedule",
    • check the Time Range,
    • use the correct cron schedule: */30 * * * *
    • Number of results=0
    • Trigger once,
    • throttle (if you want to disable your alert for a period after triggering),
    • Add action:
      • Add to triggered alerts,
      • Send email,
    • Add the infos of the alert email,
    • save it.

Ciao.

Giuseppe

View solution in original post

praneethlekkala
Path Finder

Thanks!! let me try this..

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @praneethlekkala,

good for you!

Ciao and happy splunking.

Giuseppe

P.S.: Karma Points are appreciated by all the contributors 😉

praneethlekkala
Path Finder

Thanks

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @praneethlekkala,

it's easy:

  • open the app where you want to locate your alert,
  • open search form,
  • run your search, using the time range you want in the alert (e.g. last 30 minutes),
  • click on "Save as" and then "Alert",
  • insert the infos requested in the form:
    • alert title,
    • permissions "Shared in App",
    • scheduled: "Run on cron schedule",
    • check the Time Range,
    • use the correct cron schedule: */30 * * * *
    • Number of results=0
    • Trigger once,
    • throttle (if you want to disable your alert for a period after triggering),
    • Add action:
      • Add to triggered alerts,
      • Send email,
    • Add the infos of the alert email,
    • save it.

Ciao.

Giuseppe

Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...