Splunk Search

How to send the matching value in the log file , in the email that we send as a part of the alert

tusharsappal
Explorer

I had a query in Mind till now I only know that Splunk only sends the count of the events happened during the time duration , is there any way we can send the actual matching content in the email whenever the alert is fired ,i.e can we make the reporting more intuitive and clear ,sending the actual matching text in the email body

Thanks in Advance
Tushar

0 Karma

richgalloway
SplunkTrust
SplunkTrust

In addition to lukejadamec's response, check your alert configuration. Tick the box labelled "Include results in email" and select if they should be included inline or as a CSV or PDF attachment.

---
If this reply helps you, Karma would be appreciated.
0 Karma

tusharsappal
Explorer

Actually I ahve checked the include the results in email check box , I was just wondering to make the reporting more intuitive , that I got that Splunk reports what is the search results So I believe that I will be modifying my Search query

Regards
Tushar

0 Karma

lukejadamec
Super Champion

You can only include what is contained in the output of your search in the email.
You will need to change your search so it generates the output you're looking for.
If you need help with the search output you can post the search here, and tell us specifically what you want as output.

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...