We have the following search that sends a report once a day.
| inputlookup append=T malware_tracker | stats min(firstTime) as firstTime,dc(dest) by signature | eval _time=firstTime | `daysago(1)` | sort 100 - firstTime | `uitime(firstTime)` | table firstTime,signature,dc(dest)
We had this set up as an alert in the past, but due to the nature of alert, it generated continuous emails. I am thinking I need to customize the alert based on the signature and I am not sure how to go about doing this. Thank you.
I'd recommend watching all of it, but about 1:40 into this video by Splunk is an example of throttling alerts. Perhaps that's all you need?
If not, there are certainly things that can be done, but a little more information about what sort of output the existing search gives, how often it has results, what it is you are actually trying to achieve and so on would be very helpful. It may also be useful to see a more "raw" look at the events this is based off of.
I'd recommend watching all of it, but about 1:40 into this video by Splunk is an example of throttling alerts. Perhaps that's all you need?
If not, there are certainly things that can be done, but a little more information about what sort of output the existing search gives, how often it has results, what it is you are actually trying to achieve and so on would be very helpful. It may also be useful to see a more "raw" look at the events this is based off of.