Splunk Search

Alert to Report

Susha
Engager

Hi ,

I have some alerts which i want to change as report . the reason is , if there are no events then alert is not sending any data/email where in case of report we can receive atleast one blank csv attacehed report/email  if there is no data .. so as per business requirement we want to change allalert to report .. how can we do that ?

 

0 Karma

Susha
Engager

thanks @Joannna  for quick revert ..

please consider condition here as a alert which will trigger the events everyday at 9 and it will send that data in CSV .. here problem is i am getting nothing if no data .. if i will convert this in report then it will sent report/email will blank data no matter if data is there or not..

0 Karma

Joannna
Explorer

can you put the search here? the issue should be there

Tags (1)
0 Karma

Joannna
Explorer

Hello ,

 

So basically , an alert is based on a scheduled saved search that whenever certain conditions are overcome, generates one or more actions to be executed.

A report is scheduled by you at an specific time, example everyday at 9 am , or 2 times a day one at 7 other at 4. So this would be your first issue changing to a report.

It should be fairy easy just copy the search and put it on a report , or save as report, if you need futher assistance on that you can add the code here.

0 Karma
Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...