Alerting

Sending alert only once for similar events

michael_vi
Path Finder

We have a TrueSight integration with Splunk that is sending results when a certain event occurs.

Sometimes no events are being sent, and I want to document only the first time when it happens, for example:

Time0510152025303540455055051015202530
# of Events3400081520555660000089

 

I want to include also 0 values that occurs only the first time and not all the times when we have an alert.

 

Please assist

 

Labels (3)
0 Karma

michael_vi
Path Finder

The desired result is to send alerts for all events > 0 and only once for alert that has 0 for the first time:

Scheduled alerts:

Time0510152025303540455055051015202530
# of Events3400081520555660000089

 

Desired output, i.e. the alert that I want to receive

Time05102530354045505502530
# of Events3408152055566089

 

Is there a configuration that I need to activate in alerts box? Or is there something else that I'm missing?

 

 

0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @michael_vi,

Can you please describe your desired output more clear? If you mean filtering only  the bold ones it conflicts with the definition. You want to see 3,4,0,8,0,5 etc or 3,0,8,0,5,0,8 etc?

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

rishabhshah
Path Finder

As per above table, considering Time as _time and # of events as count, Please try below query -

| search count=0
| stats first(count) as count by _time

Let me know if this is what you're aiming to achieve.

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...