<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert Escalation? in Alerting</title>
    <link>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69995#M973</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;There's no way to handle alert escalation out of the box.&lt;/P&gt;

&lt;P&gt;You could, however, edit the sendemail.py Python script that fires when an alert triggers to introduce/keep state and handle escalation logic. You would need to be versant in Python to do so.&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;</description>
    <pubDate>Fri, 21 Jun 2013 14:01:48 GMT</pubDate>
    <dc:creator>malmoore</dc:creator>
    <dc:date>2013-06-21T14:01:48Z</dc:date>
    <item>
      <title>Alert Escalation?</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69994#M972</link>
      <description>&lt;P&gt;Is it possible to have an Alert that will, after some set amount of notifications, start to email to a different set of addresses? That is to say, replicate the behavior possible with Nagios as described &lt;A href="http://nagios.sourceforge.net/docs/3_0/escalations.html"&gt;here&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2013 13:58:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69994#M972</guid>
      <dc:creator>muebel</dc:creator>
      <dc:date>2013-06-20T13:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Alert Escalation?</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69995#M973</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;There's no way to handle alert escalation out of the box.&lt;/P&gt;

&lt;P&gt;You could, however, edit the sendemail.py Python script that fires when an alert triggers to introduce/keep state and handle escalation logic. You would need to be versant in Python to do so.&lt;/P&gt;

&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2013 14:01:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69995#M973</guid>
      <dc:creator>malmoore</dc:creator>
      <dc:date>2013-06-21T14:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Alert Escalation?</title>
      <link>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69996#M974</link>
      <description>&lt;P&gt;Hi muebel,&lt;/P&gt;

&lt;P&gt;This might be a bit old, but did you find out a way to do this? I am facing a similar situation and this is what I could dig:&lt;/P&gt;

&lt;P&gt;1-&lt;A href="https://answers.splunk.com/answers/725485/escalate-an-alert-to-a-different-email-address-aft-1.html?minQuestionBodyLength=80"&gt;https://answers.splunk.com/answers/725485/escalate-an-alert-to-a-different-email-address-aft-1.html?minQuestionBodyLength=80&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;2-&lt;A href="https://answers.splunk.com/answers/237950/triggering-an-alert-on-alerts-alert-on-alerts.html"&gt;https://answers.splunk.com/answers/237950/triggering-an-alert-on-alerts-alert-on-alerts.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Feb 2019 07:36:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Alerting/Alert-Escalation/m-p/69996#M974</guid>
      <dc:creator>mmaqbool</dc:creator>
      <dc:date>2019-02-13T07:36:08Z</dc:date>
    </item>
  </channel>
</rss>

