This is a Splunk Modular Alert used to facilitate scheduled export of indexed data (SEND) to a file location
The exported file is just a gzipped CSV of the search results that triggered the alert.
The real intent of this add-on though is as an example for developers to follow to show how you can essentially leverage the Modular Alerts framework to perform a scheduled data output.
Other types of outputs to consider implementing : ftp,scp,jms,kafka,aws,rdbms,datawarehouse,some other data storage or processing platform etc...
You require an activation key to use this App. Visit http://www.baboonbones.com/#activation to obtain a free,non-expiring key
The only thing to keep in mind is constraint of alerts in terms of scalability. The alert action script has a limited lifetime before it’s being killed by the scheduler. The scheduler itself is also not designed for massive output loads. It should be perfectly fine for smaller scale output, though.
Perform a search in Splunk and then navigate to : Save As -> Alert -> Trigger Actions -> Add Actions -> SEND to File
On this dialogue you can enter your file output settings.
Browse to : Settings -> Alert Actions -> SEND to File -> View Log Events
Or you can search directly in Splunk : index=_internal sourcetype=splunkd component=sendmodalert action="sendfile"
This project was initiated by Damien Dallimore , email@example.com
Added an activation key requirement , visit http://www.baboonbones.com/#activation to obtain a free,non-expiring key
Splunk 7.1 compatible
Initial beta release
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.