All Apps and Add-ons

Splunk alerts for clear condition

Roy_9
Motivator

We have set up a splunk alerts for clear condition(eg., X < 50) for every 1 min and sending it to another tool where this alerts will autoclose.Is there a way where we can dedup the alerts for a certain time frame so that new alert should be triggered and should create a new incident.

We tried to throttle the alert but it's not meeting the requirement.

 

Please help me on this.

Labels (3)
0 Karma

shivanshu1593
Builder

What is the issue that you're encountering while throttling? Could you also please throw some light as to how you're sending the data to a third party system? Alert actions, custom command etc. It'll help to understand your use case a bit better and then help you.

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
0 Karma

Roy_9
Motivator

Thanks @shivanshu1593 for response.

Actually we are sending a clear alert condition every 1 minute to an another tool where that tool will auto-close this alerts based on this condition.

So we want to dedup this alerts for that particular time frame and splunk should send a new alert after that stipulated time instead of deduplicating on the existing alert.

Incase if we want to dedup the condition during that 1 minute time, shall we need to throttle by supress triggering to 1 minute or can you help in adding a dedup condition to the search?

P.S. This alert is running on a cron schedule for every minute for the search timerange of last 1 minute

0 Karma

shivanshu1593
Builder

Hello @Roy_9 ,

While setting up the throttling, in the Trigger, have you selected "Once" or "For each results". In your case, I'd go with "For each results", click on throttle checkbox and add the fields, which will be helpful to identify if the clear alert condition is new or duplicate. 

Are you sending the condition via a custom alert action that you've created, or are you using an already present alert action.

Thanks,

S

 

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
0 Karma

Roy_9
Motivator

We have selected "once" but didn't set up throttling, shall we make it to "For each results" and select throttle to 1 min on the desired fields,.

We are sending the alerts using the custom alert action (eg., search X < 50)

0 Karma

shivanshu1593
Builder

Yes please set it "For each results", select the checkbox to enable throttling and enter the desired fields and set the desired time.

That should do the trick. Let me know if it works.

Thank you,

S

 

 

 

Thank you,
Shiv
###If you found the answer helpful, kindly consider upvoting/accepting it as the answer as it helps other Splunkers find the solutions to similar issues###
0 Karma

Roy_9
Motivator

I will test that out and let you know.

 

Thanks @shivanshu1593 

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...

Design, Compete, Win: Submit Your Best Splunk Dashboards for a .conf26 Pass

Hello Splunkers,  We’re excited to kick off a Splunk Dashboard contest! We know that dashboards are a primary ...

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...