First time posting here, and I'm a new user to Splunk. I'd love to get some advice on setting up an alert.
I want it to trigger at 8am, 12pm, 4pm, and 8pm. I've set my Cron schedule to "* 8,12,16,20 * * *". For the search's time scope, I'd like the following
8am trigger should have a search range of -12 hours to the current time.
12pm, 4pm, and 8pm triggers should have a search range of -4 hours to the current time
I've set my range time to be -12 (earliest) to the current time (now), but the 12pm, 4pm, and 8pm triggers are getting results that had already been part of the result set from the 8am trigger.
Does Splunk know when a result has been previously reported, or is there a way I can filter those out using the search query?
How does the expire parameter work? Can I leverage it in a way that I won't get previously reported results?
Would I have to set up a separate alert for the 8am trigger, even though (aside from the 12 hour lookback) it does the same thing and serves the same purpose of an alert that would encompass the other times?
Here's what search and the time range looks like on my alert. Thanks in advance for the guidance!
index="slPlatform" environment="Development" Application="AP_post_EmployeePayload_To_EmployeeProfile" | where eventLogLevel like "CRITICAL%"
... View more