Hi Team,
I am looking for the help for the Event logs report if threshold match.
I tried both way with creating a report and alert. but it either send me logs using |table _time, _raw method or sending count using |stats count | where count >0
I need to schedule last 24hrs data report like, only if there is a event at 00:00 AM.
Please guide me
Thank you
I am trying to create scheduled report or alert whichever useful to send CSV file containing search event logs.
Suppose,
Index=ABC sourcetype=XYZ "failed to run"
if there "failed to run" event present more then "0" count in last 24hrs alert or report should trigger at 12AM.
and alert or scheduled should have CSV file attached in mail notification containing search event log.
Based on Alert examples - Splunk Documentation do it like:
Index=ABC sourcetype=XYZ "failed to run" earliest=-24h latest=now
Hello cbiaris,
what is your exact problem and which goal you wanna reach?
Would be great if you can provide some more information.
My current assumption is that you wanna run a scheduled search only in that case if there are 1 or more events at a specific time.