Developing for Splunk Enterprise

Run a search based on alert result


i would like to run a search (to collect data in a summary index) triggered by an alert, which is checking for new data. e.g. if the start of a new dataset comes in, i would like to enrich, manipulate and collect the last dataset into a summary index.

if the collect search only runs on a time schedule, i may get inconsistencies in between the collected dataset due to cutting in between.
i'm looking for something like a custom alert action to trigger another saved search.

Thanks in advance.

Tags (1)
0 Karma


First possibility - look at @woodcock's answer to this question of how do you prevent a search from running during blackout periods.

You could apply a version of that solution.

Second possibility - you could use your first search to determine and return the earliest= and latest= times for your search that collects the data... and then set teh same arbitrary future date/time as both earliest and latest if your search determines there is no data.

0 Karma
Did you miss .conf21 Virtual?

Good news! The event's keynotes and many of its breakout sessions are now available online, and still totally FREE!