Splunk Search

How to send the matching value in the log file , in the email that we send as a part of the alert

tusharsappal
Explorer

I had a query in Mind till now I only know that Splunk only sends the count of the events happened during the time duration , is there any way we can send the actual matching content in the email whenever the alert is fired ,i.e can we make the reporting more intuitive and clear ,sending the actual matching text in the email body

Thanks in Advance
Tushar

0 Karma

richgalloway
SplunkTrust
SplunkTrust

In addition to lukejadamec's response, check your alert configuration. Tick the box labelled "Include results in email" and select if they should be included inline or as a CSV or PDF attachment.

---
If this reply helps you, Karma would be appreciated.
0 Karma

tusharsappal
Explorer

Actually I ahve checked the include the results in email check box , I was just wondering to make the reporting more intuitive , that I got that Splunk reports what is the search results So I believe that I will be modifying my Search query

Regards
Tushar

0 Karma

lukejadamec
Super Champion

You can only include what is contained in the output of your search in the email.
You will need to change your search so it generates the output you're looking for.
If you need help with the search output you can post the search here, and tell us specifically what you want as output.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...