Alerting

Alert emails at every splunk restart

glitchcowboy
Path Finder

I have the following savedsearch that sends an alert for an old event every time I restart splunk (indexer/search head). Any ideas why this is or how to make it stop

[Some CRITICAL Alert]
action.email = 1
action.email.inline = 1
action.email.sendpdf = 1
action.email.to = anemail@overthere.com
alert.digest_mode = False
alert.expires = 12h
alert.severity = 5
alert.suppress = 0
alert.suppress.period = 30s
alert.track = 1
cron_schedule = * * * * *
dispatch.earliest_time = rt
dispatch.latest_time = rt
displayview = flashtimeline_excel
enableSched = 1
quantity = 0
relation = greater than
request.ui_dispatch_view = flashtimeline_excel
search = eventtype="XYZ-Eventtype"
vsid = xxxxxxx

jspears
Communicator

Do the email headers indicate it's a new email every time? I would first suspect the simple explanation, a misguided MTU re-sending the same email - maybe there's a queue file on the Splunk server that your MTU is unable to remove or something.

How old is the event that triggered the original alert? I'm wondering if there might be a search artifact sticking around in $SPLUNK_HOME/var/run/splunk/dispatch.

0 Karma

glitchcowboy
Path Finder

No, it wasn't a misguided MTU, because it happened at every splunk restart, not MTU/MTA restart. I never found the cause, but eventually it just went away

0 Karma
Get Updates on the Splunk Community!

Advanced Splunk Data Management Strategies

Join us on Wednesday, May 14, 2025, at 11 AM PDT / 2 PM EDT for an exclusive Tech Talk that delves into ...

Uncovering Multi-Account Fraud with Splunk Banking Analytics

Last month, I met with a Senior Fraud Analyst at a nationally recognized bank to discuss their recent success ...

Secure Your Future: A Deep Dive into the Compliance and Security Enhancements for the ...

What has been announced?  In the blog, “Preparing your Splunk Environment for OpensSSL3,”we announced the ...