Good Morning, I am trying to create an alert to indicate that data has stopped flowing to a specific index and host after 24 hours, once created, the alert would continuously trigger. but only alerted after a new occurrence of data was received.
My current settings for my alert are as follows:
-------------------------------
Settings
Trigger Conditions
Trigger Actions:
Take a look at the TrackMe app
https://splunkbase.splunk.com/app/4621/
It has some neat features for this type of alerting and the throttling/suppression may work in your case.
An alternative would be to store the alerted state in a lookup, which you then check as part of your search each time the alert runs which then will not alert again until the state shows no alert active. You could have a saved search that clears the state when data is seen.