Alerting

What circumstances would cause modified alerts to continue to run?

casperthedog
New Member

I created a simple alert based upon an eventtype and the tag 'not-expected'.

source=[the log file containing the event] AND eventtype=[the eventtype] AND tag=not-expected

The alert worked fine.

I have since changed the eventtype search string to exclude certain events (which have tag=expected) using AND NOT, but am still getting alerts for one of the events even though the tag for that event was changed to 'expected'

I can't see any reason in my related eventtypes, search strings, or alert settings for why I am still getting alerts for this now 'expected' event.

Are there other reasons such as caching which may cause an alert to continue to fire on an event?

0 Karma

OPM
Engager

Without knowing your eventtype definition it´s hard to say why your alert is firing on wrong events. One solution could be to redefine your eventtypes (one that´s looking on "not expected" events and one that is looking on "expected" events) and tag this eventtypes with unique tagnames. Your underlying search that is powering the alerts just should be like: source=[...] AND tag::eventtype=expected.
Be aware of the usage of AND NOT vs. !=

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...