You can schedule any saved report in Splunk.
To create a report:
Write a search query and execute it.
Example:
index=main error | stats count by host
Click Save As > Report.
Provide a name and description for the report.
Last 24 hours for daily reports.Last 7 days for weekly reports.Example Query:
index=errors | stats count by error_type
Purpose:
Example Query:
index=performance | stats avg(response_time) by server
Purpose:
Write a search query to define the condition to monitor.
Example Query:
index=main | stats count by error_type | where count > 10
count > 10.Example Query:
index=system_metrics | stats avg(cpu_usage) as avg_cpu by host | where avg_cpu > 90
Condition:
Example Query:
index=auth_logs status=failed | stats count by user | where count > 5
Condition:
| Feature | Scheduled Reports | Alerts |
|---|---|---|
| Purpose | Deliver data summaries regularly. | Notify about specific conditions. |
| Frequency | Fixed intervals (e.g., daily, weekly). | Real-time or periodic checks. |
| Trigger Condition | Based on time ranges (e.g., Last 24 hours). | Based on specific data thresholds. |
| Actions | Email, save results. | Email, scripts, ticketing integration. |
Throttling—also called alert suppression—is used to limit how often an alert can fire, even if its triggering condition remains true.
When an alert condition is met, the alert is triggered.
After firing, throttling introduces a suppression window.
During this window, even if the alert condition is met again, the alert will not re-fire.
Throttle duration: 60 minutes
Condition: avg(cpu_usage) > 90
Outcome: Once the alert fires, it will be suppressed for 60 minutes, regardless of ongoing high CPU usage.
Splunk allows you to assign a severity level to each alert to classify its importance and urgency.
| Severity | Description | Example Use Case |
|---|---|---|
| Info | Informational only; no action typically required | Notification when a report finishes running |
| Warning | Indicates a potential issue; should be monitored | More than 5 failed login attempts |
| Critical | Requires immediate attention; serious impact | Unauthorized access detected |
Severity levels help prioritize incidents in dashboards, reports, and ticketing systems.
They may be used by SIEM tools or alert handlers to escalate or route alerts.
When creating or saving a report or alert, permissions must be properly set to ensure that the object:
Can be accessed by the necessary users.
Can be executed by the system.
Can send email or trigger actions.
| Visibility Option | Description |
|---|---|
| Private | Only visible to the user who created it |
| App-level | Shared within the same Splunk app (e.g., Search & Reporting) |
| Global | Visible to all users (depending on roles/permissions) |
If a scheduled alert or report is not shared or permissions are too restrictive:
The alert may fail to execute.
Email delivery may not occur.
Other users may not be able to view or edit it.
In addition to standard throttling, Splunk allows you to configure how long to suppress similar alert instances. This adds further control over alert frequency.
Search condition: avg(cpu_usage) > 90
Triggered at 10:00 AM
Suppression: 10 minutes
Even if CPU stays above 90%, the alert won’t fire again until 10:10 AM.
| Feature | Key Details |
|---|---|
| Throttle (Suppression) | Limits how often alerts re-fire after initial trigger |
| Severity Levels | Classifies alerts as Info, Warning, or Critical |
| Permissions | Impact visibility, email delivery, and execution of reports/alerts |
| Suppression Duration | Time window during which similar alerts are not re-triggered |
You created a critical alert for failed logins over 5 attempts per user. It keeps triggering every minute and spamming your inbox. What should you do?
Correct Answer: Add throttling or a suppression window to the alert.
What is a scheduled report in Splunk?
A scheduled report is a saved report that runs automatically at a specified time.
Instead of manually running a search, users can configure reports to run periodically—such as every hour or every day. Scheduled reports generate results automatically and can be used to populate dashboards or trigger alerts. This automation is useful for regular monitoring tasks.
Demand Score: 75
Exam Relevance Score: 90
What is an alert in Splunk?
An alert is a saved search that triggers a notification when specific conditions are met.
Alerts monitor data continuously and notify users when defined criteria occur. For example, an alert might trigger when login failures exceed a certain threshold or when server errors increase. Notifications can be sent via email or displayed in Splunk. The SPLK-1001 exam frequently tests the concept that alerts are conditional saved searches used for monitoring events.
Demand Score: 78
Exam Relevance Score: 92
Where can you view alerts that have already been triggered in Splunk?
You can view them in the Triggered Alerts section.
When an alert condition is met, Splunk records the event as a triggered alert. Users can review these alerts to investigate issues or confirm monitoring activity. This feature helps analysts track system incidents and review historical alert activity.
Demand Score: 70
Exam Relevance Score: 88