Alerting

Alerting splunk

arunsundaram
New Member

we have Splunk log monitoring alert configured for x occurrences in 5 minutes so in 30 minutes, we get around 6 incidents.
We would like to have a solution to have just one incident until first issue is fixed. Is there any way to achieve

Tags (1)
0 Karma
1 Solution

Azeemering
Builder

You can supress alerts using the throttle tickbox in the alert configuration:

See screenshot:
https://imgur.com/ot9BVzp

See documentation:
https://docs.splunk.com/Documentation/Splunk/7.0.2/Alert/ThrottleAlerts

View solution in original post

0 Karma

Azeemering
Builder

You can supress alerts using the throttle tickbox in the alert configuration:

See screenshot:
https://imgur.com/ot9BVzp

See documentation:
https://docs.splunk.com/Documentation/Splunk/7.0.2/Alert/ThrottleAlerts

0 Karma
Get Updates on the Splunk Community!

Exporting Splunk Apps

Join us on Monday, October 21 at 11 am PT | 2 pm ET!With the app export functionality, app developers and ...

Cisco Use Cases, ITSI Best Practices, and More New Articles from Splunk Lantern

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Build Your First SPL2 App!

Watch the recording now!.Do you want to SPL™, too? SPL2, Splunk's next-generation data search and preparation ...