Splunk Search

How to run a search on a config file contents

chris94089
Path Finder

We see lots of alerts right now.  So I thought I would develop a dashboard that quickly searches through the alert configurations themselves, see if I can spot any trends. While I'm at it, find data on when they were fired.

I read that alert configurations end up on savedsearches.conf, but how do I search that?  Is this even possible?

I have a feeling it involves a REST command, but the ones I'm writing return other data than I want.  Or else I'm searching the _internal index.

Thanks!

Labels (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

To search the savedsearches.conf file, start with 

| rest /services/configs/conf-savedsearches

If you'd rather not re-invent the wheel, there are apps on splunkbase that may help.  See Search Activity (https://splunkbase.splunk.com/app/2632/) and Config Quest (https://splunkbase.splunk.com/app/3696/

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...