Reporting

How do I configure my Splunk report to only send an email when there is new data?

chustar
Path Finder

When we don't have data for a day, our splunk report still sends out its email with old and stale data. How can I prevent it from doing this?

Tags (3)
0 Karma

somesoni2
Revered Legend

We would need more information, in order to give you proper help here. Could you post your alert search (mask anything sensitive, its schedule information, the time range it works on (Start time and End time) etc?

0 Karma

woodcock
Esteemed Legend

You can split it up into 2 searches that run one right after. The second one writes the results to a file with | outputcsv. The first one reads this file with inputcsv and compares the results in this file (the previous day's run) with the results from your existing search. If it is the same, make sure that your combined search generates 0 rows and have your alert email only when Number of events is greater than 0. Done.

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...