Alerting

Alert search window needs to be longer than Alert time range getting duplicate events- How can I resolve this?

matt_mrcooper
New Member

I know this seems obvious I'm searching 5 minutes back and alerting on the results every 1 minute so there is 4 minutes of over lap on each search.  But due to some internal issues the logs are not always indexed right on time so I can't to a 1 minute search for a 1 minute alert or I would for sure miss stuff.

The alert is throttled to to suppress triggering for 5 minutes but this is missing alerts too.  Is there any way for the alert to be aware of a previous alert result and make a dynamic allow list?

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Alerts can be throttled by field values.  Edit the alert and change the Trigger setting to "For each result".  That will show the "Suppress results containing field value" box.  Enter the names of the fields (separated by commas) you want Splunk to use to throttle the alerts.  If the alert triggers again with the given time and the field(s) listed have values already alerted then no new alert will be sent.

richgalloway_0-1667939982601.png

 

---
If this reply helps you, Karma would be appreciated.
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...