<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alerts are duplicating in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681088#M15817</link>
    <description>&lt;P&gt;Yes im getting multiple occurrences for the same event, as i told you before how splunk is reading my text file.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Mar 2024 18:44:08 GMT</pubDate>
    <dc:creator>mukhan1</dc:creator>
    <dc:date>2024-03-18T18:44:08Z</dc:date>
    <item>
      <title>Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681017#M15808</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;I have set a email alert.&lt;BR /&gt;&lt;BR /&gt;ID is the unique identifier my source file is text file which updates after some time whenever new activity is capture, Forwarder will re read that file again, to avoid duplication of search im using dedup ID,&amp;nbsp; if I don't use dedup ID in my search it will show me numbers of result which is not equal to the file.&lt;BR /&gt;&lt;BR /&gt;For e.g: my file have 3 logs before after some activity 2 more logs added in file total count is 5, however splunk is showing 8 events in GUI. to avoid this im using dedup ID.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Now, the issue is my alert is on real time im getting alot duplicated results in my email. Below is my query&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;index=pro sourcetype=logs Remark="xyz"
| dedup ID
| table ID, _time,  field1. field2, field3, field4&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;using the above query im getting correct result on GUI but numbers of alerts generate on email.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 12:19:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681017#M15808</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T12:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681047#M15809</link>
      <description>&lt;P&gt;It is not clear what settings you have on your alert searches. Do you have overlapping time periods? What is your alert trigger (that causes multiple alerts)? Please provide more detail.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 14:59:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681047#M15809</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-03-18T14:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681052#M15810</link>
      <description>&lt;P&gt;Also dedup is a tricky command. It returns just first occurrence of the event with given deduped field(s) _in search order_ (which doesn't have to be what you need).&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 15:10:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681052#M15810</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-18T15:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681076#M15811</link>
      <description>&lt;P&gt;I have set it to real-time monitoring and per-result, what i have identified so far is whenever splunk reads that file it giving me alert based on it.&lt;BR /&gt;&lt;BR /&gt;For e.g: If there are 3 logs of Remark="xyz" and some new record added in the file with any other or same remark it gives me alerts again for those 3 logs (remark="xyz") until the file has done reading.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;To avoid this im using dedup ID, my understanding was alerts are based on search query however using this query i don't have duplicated events but my alerts are duplicating.&lt;BR /&gt;&lt;BR /&gt;It is very strange for me. below is my search query,&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;index=pro sourcetype=logs Remark="xyz"&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| dedup ID&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;| table ID, _time. field1, field2, field3&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Hope this clears.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 17:52:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681076#M15811</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T17:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681077#M15812</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp; I think my alerts results are not giving me results for dedup search, instead it is reading whole file again and again.&lt;BR /&gt;&lt;BR /&gt;Since im using text file and it is keep getting amend by application service till EOD. So splunk is reading file again and again till the end of day. This is why im getting duplication of events on Splunk.&lt;BR /&gt;&lt;BR /&gt;Is there anyway i can avoid events duplication on universal forwarder?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 17:57:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681077#M15812</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T17:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681078#M15813</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 17:57:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681078#M15813</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T17:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681082#M15814</link>
      <description>&lt;P&gt;OK. First things first. Don't use real-time searches (in your case real-time alerts) unless there is absolutely no other way. Real-time searches hog single CPU on a search tier and one CPU per each indexer on an indexer tier. And keep them allocated for the whole time of the search.&lt;/P&gt;&lt;P&gt;Secondly, if you are ingesting the same events over and over again, that's not the alerting problem, that's your onboarding done wrong.&lt;/P&gt;&lt;P&gt;Search for a single ID over a longer period of time and see if the events are duplicated. If they are, that's one of your problems. (another - as I said before - is searching real-time).&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 18:13:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681082#M15814</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-18T18:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681086#M15815</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp; Got your point, I have search for single ID and events are not duplicating if i use dedup ID, however on my alerts query i think dedup ID is not working it is giving me results from raw events. Events are duplicating the number of records im getting on that ID (without using dedup ID) are equal to my alerts.&lt;BR /&gt;&lt;BR /&gt;How can i get real time alerts based on the above scenario?&lt;BR /&gt;&lt;BR /&gt;Do i have to configure data on boarding? If yes, an you guide how can i avoid my events to be duplicate.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Here is a example how UF is reading that file, suppose i have 5 events after some time 4 more events generated on that txt file, &lt;STRONG&gt;so the overall count should be 9 but instead of 9 it is showing 14 here is the breakdown of it(5 events in start + 4 events added + 5 events that were before in that file). This is how my data on-boarding.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 18:38:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681086#M15815</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T18:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681087#M15816</link>
      <description>&lt;P&gt;No. don't use dedup. That's the whole point. Don't use dedup and see if you are finding multiple occurrences of "the same" event.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 18:42:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681087#M15816</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-18T18:42:44Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681088#M15817</link>
      <description>&lt;P&gt;Yes im getting multiple occurrences for the same event, as i told you before how splunk is reading my text file.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 18:44:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681088#M15817</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T18:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681089#M15818</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp; Is there any way my alert to send unique data in the time lapse of 24 hr, Like if any event occur with the ID="ABC" it should send email alert one time after that it ignores that event.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 19:00:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681089#M15818</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T19:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681105#M15819</link>
      <description>&lt;P&gt;So firstly you should get your data ingestion process right. Events should not be ingested multiple times. Since we don't know where this data comes from, we can't offer much advice here. You can open another thread in the "Getting data in" section about this problem.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 22:36:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681105#M15819</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-03-18T22:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681108#M15820</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp; Okay thanks but i didn't find any way to avoid duplication on UF itself earlier,&lt;BR /&gt;&lt;BR /&gt;I was thinking to do it other way, what if i enable Suppress results triggering the alert and set it to 24 hours, i think each unique id&amp;nbsp; event will alert once within that period.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;below is the query,&lt;BR /&gt;&lt;BR /&gt;index=pro sourcetype=logs Remark="xyz"&lt;BR /&gt;| dedup ID&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 23:10:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681108#M15820</guid>
      <dc:creator>mukhan1</dc:creator>
      <dc:date>2024-03-18T23:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: Alerts are duplicating</title>
      <link>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681143#M15824</link>
      <description>&lt;P&gt;You could record which events have triggered an alert and when it was triggered in a summary index or keystore/csv and remove these from the subsequent set of results is within 24 hours.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 08:18:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alerts-are-duplicating/m-p/681143#M15824</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-03-19T08:18:34Z</dc:date>
    </item>
  </channel>
</rss>

