Alerting

help on Splunk alert recurrence

jip31
Motivator

Hi

I use a splunk alert with a 24 hours slottime

what is strange is that this alert show me an event older than 24 hours

so I have 2 questiosn

1) How is it possible that an alert occurs with an event outside the slot time specified?

2) How to customize the alert for being sure that it shows only new events and not events already shown? 

It means that I need the alert occurs just one time when an event is detected

thanks

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your search has to be able to filter out the events you don't want, or have already looked at. This will depend on your search and your data.

0 Karma

jip31
Motivator

Have you an example to filter events that have already looked at? Is there any alert customization for doing that like throttle or expiration?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Alerts have throttles but that's at the alert level, not at the event which have been looked at.

As I said, it depends on your search and your data. For example, if you are searching over 25 hours, every 24 hours, there will be an overlap of 1 hour. Having said that, it depends how quickly your data is indexed, real lag, and how far behind your timestamp field (_time) is to actual time, extended lag. In order to fashion a search which takes these factors into account, you need to understand your data, how it is indexed, when it is indexed, etc. When you know this, you might have a chance at eliminating events which you have (or may have) already looked at.

Another way you might approach this is to copy the events you have looked at into a summary index and then ignore any events which are already in your summary index.

0 Karma

jip31
Motivator

thanks for your answer even if it's not really easy to understand

the data are approximatively indexed every 20 minutes

so concerning my problem i dont understand why my last related event vs my alert happened last Friday and why my alert has occurend once again today

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You haven't provided sufficient information for anyone to be able to determine why your search picked up events which you weren't expecting, or why you search failed to exclude these from your alert. It is like me asking you, why did my search fail?

0 Karma
Get Updates on the Splunk Community!

Observability Unlocked: Kubernetes Monitoring with Splunk Observability Cloud

 Ready to master Kubernetes and cloud monitoring like the pros? Join Splunk’s Growth Engineering team for an ...

Update Your SOAR Apps for Python 3.13: What Community Developers Need to Know

To Community SOAR App Developers - we're reaching out with an important update regarding Python 3.9's ...

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...