Configure alerts in savedsearches.conf
You can use Splunk Web to configure most alerts. If you have Splunk Enterprise, you can configure alerts by editing savedsearches.conf. For reference, see savedsearches.conf in the Splunk Enterprise Admin Manual.
Splunk Cloud Platform
Use the Splunk Web steps to configure alerts. See Create scheduled alerts. You can't configure alerts using the configuration files.
Splunk Enterprise
To configure alerts using the configuration files, follow these steps.
- Only users with file system access, such as system administrators, can configure alerts using configuration files.
- Review the steps in How to edit a configuration file in the Splunk Enterprise Admin Manual.
- You can have configuration files with the same name in your default, local, and app directories. Read Where you can place (or find) your modified configuration files in the Splunk Enterprise Admin Manual.
Steps
- Open or create a savedsearch.conf file in the proper directory. See Configuration file paths.
- Create or edit the stanza for the saved search. See Example savedsearch.conf stanza.
Configuration file paths
Open or create a local savedsearch.conf file at $SPLUNK_HOME/etc/system/local.
For apps, open or create the savedsearches.conf file in the application directory: $SPLUNK_HOME/etc/apps/<app name>/local
Example savedsearch.conf stanza
Alerts use a saved search to look for events. savedsearches.conf contains a stanza for each saved search. The following example shows the stanza for a saved search with its alert action settings. In this case, the alert sends an email notification when it triggers.
[Too Many Errors Today]
# send an email notification
action.email = 1
action.email.message.alert = The alert condition for '$name$' in the $app$ fired with $job.resultCount$ error events.
action.email.to = address@example.com
action.email.useNSSubject = 1
alert.suppress = 0
alert.track = 0
counttype = number of events
quantity = 5
relation = greater than
# run every day at 14:00
cron_schedule = 0 14 * * *
#search for results in the last day
dispatch.earliest_time = -1d
dispatch.latest_time = now
display.events.fields = ["host","source","sourcetype","latitude"]
display.page.search.mode = verbose
display.visualizations.charting.chart = area
display.visualizations.type = mapping
enableSched = 1
request.ui_dispatch_app = search
request.ui_dispatch_view = search
search = index=_internal " error " NOT debug source=*splunkd.log* earliest=-7d latest=now
disabled = 1
For an example of configuring alerts, see the savedsearches.conf.example file in the Splunk Enterprise Admin Manual.