Alerting

help on Splunk alert recurrence

jip31
Motivator

Hi

I use a splunk alert with a 24 hours slottime

what is strange is that this alert show me an event older than 24 hours

so I have 2 questiosn

1) How is it possible that an alert occurs with an event outside the slot time specified?

2) How to customize the alert for being sure that it shows only new events and not events already shown? 

It means that I need the alert occurs just one time when an event is detected

thanks

Labels (1)
Tags (1)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your search has to be able to filter out the events you don't want, or have already looked at. This will depend on your search and your data.

0 Karma

jip31
Motivator

Have you an example to filter events that have already looked at? Is there any alert customization for doing that like throttle or expiration?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Alerts have throttles but that's at the alert level, not at the event which have been looked at.

As I said, it depends on your search and your data. For example, if you are searching over 25 hours, every 24 hours, there will be an overlap of 1 hour. Having said that, it depends how quickly your data is indexed, real lag, and how far behind your timestamp field (_time) is to actual time, extended lag. In order to fashion a search which takes these factors into account, you need to understand your data, how it is indexed, when it is indexed, etc. When you know this, you might have a chance at eliminating events which you have (or may have) already looked at.

Another way you might approach this is to copy the events you have looked at into a summary index and then ignore any events which are already in your summary index.

0 Karma

jip31
Motivator

thanks for your answer even if it's not really easy to understand

the data are approximatively indexed every 20 minutes

so concerning my problem i dont understand why my last related event vs my alert happened last Friday and why my alert has occurend once again today

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You haven't provided sufficient information for anyone to be able to determine why your search picked up events which you weren't expecting, or why you search failed to exclude these from your alert. It is like me asking you, why did my search fail?

0 Karma
Get Updates on the Splunk Community!

Discover Powerful New Features in Splunk Cloud Platform: Enhanced Analytics, ...

Hey Splunky people! We are excited to share the latest updates in Splunk Cloud Platform 9.3.2408. In this ...

Splunk Classroom Chronicles: Training Tales and Testimonials

Welcome to the "Splunk Classroom Chronicles" series, created to help curious, career-minded learners get ...

Access Tokens Page - New & Improved

Splunk Observability Cloud recently launched an improved design for the access tokens page for better ...