Alerting

Alerting splunk

arunsundaram
New Member

we have Splunk log monitoring alert configured for x occurrences in 5 minutes so in 30 minutes, we get around 6 incidents.
We would like to have a solution to have just one incident until first issue is fixed. Is there any way to achieve

Tags (1)
0 Karma
1 Solution

Azeemering
Builder

You can supress alerts using the throttle tickbox in the alert configuration:

See screenshot:
https://imgur.com/ot9BVzp

See documentation:
https://docs.splunk.com/Documentation/Splunk/7.0.2/Alert/ThrottleAlerts

View solution in original post

0 Karma

Azeemering
Builder

You can supress alerts using the throttle tickbox in the alert configuration:

See screenshot:
https://imgur.com/ot9BVzp

See documentation:
https://docs.splunk.com/Documentation/Splunk/7.0.2/Alert/ThrottleAlerts

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...