Splunk IT Service Intelligence

ITSI Duplicate Alerts (Action)

felixwawolangi1
New Member

Hi,

I'm trying to configure a NEAT that would send one email / raise one SNOW incident for each episodes.

I tried a few different Action Rules:

  • Number of events in episode >= 1 --> this would send emails for every notable events instead of one for the episode, and will continue sending emails until the episode breaks
  • Number of events in episode == 1 --> this does not trigger emails, since the episodes would typically have 3-4 events

I have a different NEAP for a different type of alert where it would raise the incident correctly after the 3rd (same) event e.g. after 15 minutes at 5 mins search interval - by using:
- Number of events in episode == 3

In this case though, the events are generated all at once, and there could be 1-8 events from different environments that I'm aggregating to one episode.

Regards

Labels (1)
0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...