Reporting

FEATURE REQUEST: Splunk Alert: All Clear Notification

bandit
Motivator

Enhancement case #464044

Requesting that Splunk have an option to send an all clear alert after x many iterations of an alert condition not matching after having matched for 1 or more iterations.

Example: An alert is triggered for CPU usage above 95% which may send an email, a notice in Triggered Alerts, run a script, and/or a post to slack.

I would like to have a check box option to send another alert when the condition has cleared. i..e CPU has dropped below 95%

Ideally this would be a checkbox with an option for how many negative matches before an all clear alert is sent.

If I check cpu average every 5 minutes and get these values:
check01 5:05 PM CPU 95%
check02 5:10 PM CPU 95%
check03 5:15 PM CPU 75%
check04 5:20 PM CPU 75%

check01 would trigger the initial alert
check03 would trigger the all clear

Enhancement case #464044 opened.

Labels (1)
Get Updates on the Splunk Community!

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics GA in US-AWS!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...