Alerting

How to Trigger alert for first 3 times and then suppress the consecutive alerts

ksubramanian198
Engager

Hi,
I have scheduled a Splunk alert to be executed for every 1 minute, if it matches my search condition for last 10 minutes events, then this will trigger an alert once. Throttle time is set as 8 minutes.
I would like to trigger 3 consecutive alerts and then throttle for 8 minutes, currently it triggers alert once and throttling for 8 minutes. Please let me know if there is a way achieve this.

Tags (1)
0 Karma

woodcock
Esteemed Legend

You can dump your conditions into a lookup and then create an independent caretaker/housekeeping/alerting search to clean it. Like this:

Your Current Alerting Search
| table _time Other Stuff Here
| outputlookup append=true YourLookup
| where ThisFIeldWillNeverExists=="So this line drops all current events"
| inputlookup append=true YourLookup
| eventstats count
| where count<=YourThrottlingLimitHere

Then you schedule your other search to do something like this:

|inputlookup YourLookup
| where _time <= relative_time(now, "-10m")
| outputlookup YourLookup

Tune to your liking but you get the idea.

0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...