<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205076#M3568</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I had the same problem, and in my case i just create a filed to mix the other to fields and use it to the throttiling setting.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|eval throttling = field1.field2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope i help you&lt;/P&gt;</description>
    <pubDate>Thu, 14 Apr 2016 12:56:21 GMT</pubDate>
    <dc:creator>jmallorquin</dc:creator>
    <dc:date>2016-04-14T12:56:21Z</dc:date>
    <item>
      <title>How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205075#M3567</link>
      <description>&lt;P&gt;I have set up an alert that runs every 5 minutes to check for certain logs. I wanted to throttle the output based on 2 fields, so I enabled the throttle for 24 hrs and put the values in separated by a comma in the "Suppress results containing field value" field. &lt;/P&gt;

&lt;P&gt;However, it looks like my alert is not as accurate as it should be. The values in the "Suppress results containing field value", once separated by a comma, do they act as an AND condition or OR condition?&lt;/P&gt;

&lt;P&gt;So it's basically an alert set to run every 5 minutes throttled by 24 hrs based on 2 fields, which is not working as expected.    &lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2016 06:07:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205075#M3567</guid>
      <dc:creator>howwie</dc:creator>
      <dc:date>2016-04-14T06:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205076#M3568</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;I had the same problem, and in my case i just create a filed to mix the other to fields and use it to the throttiling setting.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|eval throttling = field1.field2
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope i help you&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2016 12:56:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205076#M3568</guid>
      <dc:creator>jmallorquin</dc:creator>
      <dc:date>2016-04-14T12:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205077#M3569</link>
      <description>&lt;P&gt;Great thanks, will give it a shot today. &lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2016 16:17:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205077#M3569</guid>
      <dc:creator>howwie</dc:creator>
      <dc:date>2016-04-14T16:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205078#M3570</link>
      <description>&lt;P&gt;I am having the same issue, and I do not quite understand what jmallorquin is suggesting. Does anyone else have the same issue or another solution?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 17:15:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205078#M3570</guid>
      <dc:creator>devinmclean</dc:creator>
      <dc:date>2016-10-28T17:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205079#M3571</link>
      <description>&lt;P&gt;The field names that you enter separated by a comma, act as an "AND" operation in accordance with the &lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Alert/ThrottleAlerts"&gt;Alerting Manual - Throttle Alert&lt;/A&gt; reference. For example, if your Alert search query summarized alert signature hits per host like the following fields to a table:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|table hostname, signature_id, signature_hit_time, signature_hit_count
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you set the Alert trigger as &lt;STRONG&gt;Per-result&lt;/STRONG&gt; (For each result), enabled &lt;STRONG&gt;Throttle&lt;/STRONG&gt;, and in the &lt;STRONG&gt;Suppress results containing field value&lt;/STRONG&gt; added &lt;CODE&gt;hostname, signature_id&lt;/CODE&gt; then the "Per-result" alert for that combination of "hostname AND signature_id" would be suppressed via &lt;STRONG&gt;Suppress triggering for&lt;/STRONG&gt; time value. (in Splunk 7.2)&lt;/P&gt;

&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/Alert/ThrottleAlerts"&gt;https://docs.splunk.com/Documentation/Splunk/latest/Alert/ThrottleAlerts&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2019 06:33:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205079#M3571</guid>
      <dc:creator>bwlm</dc:creator>
      <dc:date>2019-04-06T06:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to set an alert to run every 5 minutes with an alert throttle set for 24 hours based on 2 fields?</title>
      <link>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205080#M3572</link>
      <description>&lt;P&gt;It is &lt;CODE&gt;AND&lt;/CODE&gt; logic.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2019 15:03:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/How-to-set-an-alert-to-run-every-5-minutes-with-an-alert/m-p/205080#M3572</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-04-07T15:03:36Z</dc:date>
    </item>
  </channel>
</rss>

