I want to create a Jira when there isn't anymore events in an index.
The "Open an issue in JIRA Service Desk" alert action doesn't works when there is no event in Splunk alert search result.
Step to reproduce
create an alert with "Open an issue in JIRA Service Desk" alert action and trigger condition is "number of result is equals to 0"
Notice the error in _internal index, splunk search : index=_internal action=jira_service_desk
error :
ERROR sendmodalert [2583196 AlertNotifierWorker-0] - action=jira_service_desk STDERR - FileNotFoundError: [Errno 2] No such file or directory: '/opt/splunk/var/run/splunk/dispatch/scheduler_amVhbi1iYXB0aXN0ZS5jaGFydmV0QGJsYWJsYWNhci5jb20_YmxhYmxhY2FyX3NlYw__RMD52c0fee565e503f75_at_1730220840_21247/results.srs.zst'
Non elegant workaround
Create a Splunk report that creates events in a summary index when there is no more events in the first index (cf context paragraph), use collect Splunk command
Create a Splunk alert with trigger condition = "number of result >0 in summary index"
Hi,
Context
I want to create a Jira when there isn't anymore events in an index. The "Open an issue in JIRA Service Desk" alert action doesn't works when there is no event in Splunk alert search result.
Step to reproduce
index=_internal action=jira_service_desk
error :Non elegant workaround
Next steps
I can provide more detail if required!
Thanks!