Create an eventtype for the conditions you want to alert on, for example from eventtypes.conf:
[nbx] search = "status err"
Then create a Saved Search that Alerts if there are any events with this eventtype in savedsearch.conf:
[nbx] action.email = 1 action.email.inline = 1 action.email.sendresults = 1 action.email.to = firstname.lastname@example.org alert.digest_mode = False alert.severity = 4 alert.suppress = 0 alert.track = 1 counttype = number of events cron_schedule = */5 * * * * description = gba's nbx experiment dispatch.earliest_time = -6m@m dispatch.latest_time = -1m@m enableSched = 1 quantity = 0 relation = greater than search = eventtype="nbx"
Going forward, anytime Splunk indexes an event with the string status err, I'll receive an email alert.