Getting Data In

I noticed script alert action is officially deprecated. No easy way to setup a script triggered by log keyword?

NakatsuKinichi
Engager

The run a script alert action is officially deprecated. Create a custom alert action to package a custom script instead. Learn more
https://docs.splunk.com/Documentation/Splunk/8.0.2/AdvancedDev/CustomAlertConvertScripted

0 Karma

manjunathmeti
Champion

Hi @NakatsuKinichi,

Check my answer here to create a custom alert action with a script: https://answers.splunk.com/answers/810829/problem-with-scripted-alert.html#answer-810832

Once you create custom alert action configure alert with custom action, select Trigger condition as custom and set condition something like:

| where log_keyword <>= "match_value_ or_count"

OR

| where some conditional logic on log_keyword field values.

For more simplicity you can add conditional logic on log_keyword field values in the alert query itself and set Trigger condition to trigger when number of results is greater than 0.

0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...