We have only one log in the Splunk, but the user is receiving 2 alerts at a time with the same search id.
Hi,
Which trigger conditions are you using? Have you enabled throttle for this alert?
If for any reason search is returning duplicate results you would enable throttle based on an unique field for that event.
Basically, this alert is looking for an event so I mentioned fields command at the end, and the throttle is not enabled..
Example:
| fields field1 field2
Can you post this alert from savedsearches.conf or screen shot from GUI. Those helps the Community to help you.
r. Ismo