Splunk Search

Alert to Report

Susha
Engager

Hi ,

I have some alerts which i want to change as report . the reason is , if there are no events then alert is not sending any data/email where in case of report we can receive atleast one blank csv attacehed report/email  if there is no data .. so as per business requirement we want to change allalert to report .. how can we do that ?

 

0 Karma

Susha
Engager

thanks @Joannna  for quick revert ..

please consider condition here as a alert which will trigger the events everyday at 9 and it will send that data in CSV .. here problem is i am getting nothing if no data .. if i will convert this in report then it will sent report/email will blank data no matter if data is there or not..

0 Karma

Joannna
Explorer

can you put the search here? the issue should be there

Tags (1)
0 Karma

Joannna
Explorer

Hello ,

 

So basically , an alert is based on a scheduled saved search that whenever certain conditions are overcome, generates one or more actions to be executed.

A report is scheduled by you at an specific time, example everyday at 9 am , or 2 times a day one at 7 other at 4. So this would be your first issue changing to a report.

It should be fairy easy just copy the search and put it on a report , or save as report, if you need futher assistance on that you can add the code here.

0 Karma
Get Updates on the Splunk Community!

Index This | What’s a riddle wrapped in an enigma?

September 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

BORE at .conf25

Boss Of Regular Expression (BORE) was an interactive session run again this year at .conf25 by the brilliant ...

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...