<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to throttle email alerts on multiple unique values from one field? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149785#M2441</link>
    <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;

&lt;P&gt;Unfortunately I may not be thinking outside of the box far enough for this one. Essentially a search is ran to identify a "critical" value within a "threat level" field, and from that search we alert based on the "attack name" field. The issue I am coming across is when creating the alert action, suppression (throttling) is based on the entire search. So in the event that 1 "attack name" out of 1,000 triggers the alert, it is suppressed for example 4 hours. This is an issue because I would like to alert for any attack name and only suppress if the attack name is identical. Without creating a alert for every single "attack name".&lt;/P&gt;

&lt;P&gt;Assume 3 events are logged&lt;/P&gt;

&lt;P&gt;1) 12:10 - Threat Level = Critical ; Attack Name = 123 (Alert via email)&lt;BR /&gt;
2) 12:30 - Threat Level = Critical ; Attack Name = 654 (Alert via email)&lt;BR /&gt;
3) 12:50 - Threat Level = Critical ; Attack Name = 123 (No alert, suppressed by event 1)&lt;BR /&gt;
4) 12:54 - Threat Level = High ; Attack Name = 921 (No alert, threat level not = to Critical)&lt;/P&gt;

&lt;P&gt;Thoughts and Ideas? &lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Justin&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2014 17:35:03 GMT</pubDate>
    <dc:creator>jstaley</dc:creator>
    <dc:date>2014-10-02T17:35:03Z</dc:date>
    <item>
      <title>How to throttle email alerts on multiple unique values from one field?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149785#M2441</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;

&lt;P&gt;Unfortunately I may not be thinking outside of the box far enough for this one. Essentially a search is ran to identify a "critical" value within a "threat level" field, and from that search we alert based on the "attack name" field. The issue I am coming across is when creating the alert action, suppression (throttling) is based on the entire search. So in the event that 1 "attack name" out of 1,000 triggers the alert, it is suppressed for example 4 hours. This is an issue because I would like to alert for any attack name and only suppress if the attack name is identical. Without creating a alert for every single "attack name".&lt;/P&gt;

&lt;P&gt;Assume 3 events are logged&lt;/P&gt;

&lt;P&gt;1) 12:10 - Threat Level = Critical ; Attack Name = 123 (Alert via email)&lt;BR /&gt;
2) 12:30 - Threat Level = Critical ; Attack Name = 654 (Alert via email)&lt;BR /&gt;
3) 12:50 - Threat Level = Critical ; Attack Name = 123 (No alert, suppressed by event 1)&lt;BR /&gt;
4) 12:54 - Threat Level = High ; Attack Name = 921 (No alert, threat level not = to Critical)&lt;/P&gt;

&lt;P&gt;Thoughts and Ideas? &lt;/P&gt;

&lt;P&gt;Thanks,&lt;BR /&gt;
Justin&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 17:35:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149785#M2441</guid>
      <dc:creator>jstaley</dc:creator>
      <dc:date>2014-10-02T17:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to throttle email alerts on multiple unique values from one field?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149786#M2442</link>
      <description>&lt;P&gt;I found my answer to this. When specifying a action for a alert you must select the "Action Options" "When triggered, execute actions for each result". Select throttle, and specify the fields you want to suppress. ,Found my answer for this.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Modify the Action within the Alert.&lt;/LI&gt;
&lt;LI&gt;Under "Action Options" select "When triggered, execute actions - For each result"&lt;/LI&gt;
&lt;LI&gt;Select the "Throttle" check box.&lt;/LI&gt;
&lt;LI&gt;Suppress results containing field value (I specified "Attack Name" for the above example)&lt;/LI&gt;
&lt;LI&gt;Save&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 06 Oct 2014 19:44:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149786#M2442</guid>
      <dc:creator>jstaley</dc:creator>
      <dc:date>2014-10-06T19:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to throttle email alerts on multiple unique values from one field?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149787#M2443</link>
      <description>&lt;P&gt;Your answer came up when I was trying to understand how the &lt;EM&gt;Suppress triggering for&lt;/EM&gt; options works in conjunction with the &lt;EM&gt;Suppress results containing field value&lt;/EM&gt;.&lt;/P&gt;

&lt;P&gt;My understanding is that whatever comma-delimited list of fields you list in the &lt;EM&gt;Suppress results containing field value&lt;/EM&gt; text input, if data hasn't changed in those fields since the last alert, don't re-alert.&lt;/P&gt;

&lt;P&gt;My application of this is to have a single alert across a large number of hosts for a specific event, using the host as the &lt;EM&gt;Suppress results containing field value&lt;/EM&gt; field, which I'm hoping will prevent recurring alerts from a single host, but allow other hosts to still trigger notifications.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Aug 2018 17:15:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149787#M2443</guid>
      <dc:creator>dijikul</dc:creator>
      <dc:date>2018-08-22T17:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to throttle email alerts on multiple unique values from one field?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149788#M2444</link>
      <description>&lt;P&gt;That sounds correct according to the &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Alert/ThrottleAlerts"&gt;Alerting Manual - Throttle Alerts&lt;/A&gt; guide.&lt;/P&gt;

&lt;P&gt;Though in addition to your use case above for events, i.e. Event #4 "(No alert, threat level not = to Critical)" you would just need your Alert search query to include: &lt;CODE&gt;|search "Threat Level" = "Critical"&lt;/CODE&gt; to filter only those events to alert on.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Alert/ThrottleAlerts"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Alert/ThrottleAlerts&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 06:08:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-throttle-email-alerts-on-multiple-unique-values-from-one/m-p/149788#M2444</guid>
      <dc:creator>bwlm</dc:creator>
      <dc:date>2019-04-06T06:08:17Z</dc:date>
    </item>
  </channel>
</rss>

