Alerting

help on Splunk alert recurrence

jip31
Motivator

Hi

I use a splunk alert with a 24 hours slottime

what is strange is that this alert show me an event older than 24 hours

so I have 2 questiosn

1) How is it possible that an alert occurs with an event outside the slot time specified?

2) How to customize the alert for being sure that it shows only new events and not events already shown? 

It means that I need the alert occurs just one time when an event is detected

thanks

Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your search has to be able to filter out the events you don't want, or have already looked at. This will depend on your search and your data.

0 Karma

jip31
Motivator

Have you an example to filter events that have already looked at? Is there any alert customization for doing that like throttle or expiration?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Alerts have throttles but that's at the alert level, not at the event which have been looked at.

As I said, it depends on your search and your data. For example, if you are searching over 25 hours, every 24 hours, there will be an overlap of 1 hour. Having said that, it depends how quickly your data is indexed, real lag, and how far behind your timestamp field (_time) is to actual time, extended lag. In order to fashion a search which takes these factors into account, you need to understand your data, how it is indexed, when it is indexed, etc. When you know this, you might have a chance at eliminating events which you have (or may have) already looked at.

Another way you might approach this is to copy the events you have looked at into a summary index and then ignore any events which are already in your summary index.

0 Karma

jip31
Motivator

thanks for your answer even if it's not really easy to understand

the data are approximatively indexed every 20 minutes

so concerning my problem i dont understand why my last related event vs my alert happened last Friday and why my alert has occurend once again today

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You haven't provided sufficient information for anyone to be able to determine why your search picked up events which you weren't expecting, or why you search failed to exclude these from your alert. It is like me asking you, why did my search fail?

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...