Docs » Introduction to alerts and detectors in Splunk Observability Cloud » Mute alert notifications

Mute alert notifications πŸ”—

Muting is helpful when you need to stop sending alert notifications during situations that are known to trigger alerts, such as maintenance windows or tests. Muting allows you to reduce noise and focus on what really matters.

You can stop sending, or mute, alert notifications based on certain conditions you can specify. You can mute notifications for a specified period of time or indefinitely, although alerts and events are still generated, and appear in Splunk Observability Cloud.

To see your existing muting rules or create new ones, go to Alerts, then select the Muting Rules tab.

Muting rules tab in Alerts

How muting works πŸ”—

Alert notifications are muted according to muting rules, which include a schedule that sets the muting period. During the muting period, notifications that match the rule aren’t sent to subscribers. The only exception are clear notifications for alerts that were active before the muting period started.

After the muting period ends, Splunk Observability Cloud restarts sending to subscribers notifications for alerts that are still active, or for alerts triggered within the last 90 days of the muting period. To turn off sending alert notifications after the muting period has ended, edit the muting rule configuration.

Note

Muting rules only affect notifications: When a muting rule is active, alerts and events that are muted by the rule are still generated.

Create muting rules πŸ”—

To create a muting rule, you can either:

Mute specific detectors or alerts πŸ”—

Creating muting rules from existing detectors or alerts is the fastest way of muting notifications.

To mute a specific detector or alert:

  1. Open the Alerts page, and locate the detector or active alert you want to mute.

  2. Select the more icon (β‹―) next to the detector or alert, and select Create Muting Rule.

  3. Configure and save the muting rule.

Note

To mute a detector while you’re editing it, select Mute from the detector’s action menu (β‹―).

Create muting rules based on group-by dimensions πŸ”—

Muting rules automatically include dimensions specified in Group By, so that you can mute notifications from multiple detectors with a single muting rule.

To create muting rules based on group-by dimensions:

  1. Open Alerts, then select either the Active Alerts or Detectors tab.

  2. Specify the grouping dimensions using the Group By buttons.

  3. Select the more button (β‹―) next any grouped item, and select Create Muting Rule.

  4. Configure and save the muting rule.

Note

Achieve greater precision in your muting rules by using built-in dimensions instead of metadata collected asynchronously, such as AWS tags.

Create muting rules from scratch πŸ”—

Create or edit muting rules at any time from the Muting Rules tab in Alerts.

To create a new muting rule from scratch:

  1. Open Alerts, then select the Muting Rules tab.

  2. Configure and save the muting rule.

Configure your muting rule πŸ”—

The following screenshot shows the muting rule dialog box:

Configure a muting rule

To create a new muting rule, follow these steps:

  1. Use Add property to add or modify one or more properties for which you want to mute notifications. If using groups, you can also type sf_tags to find a list of tags. When you add more than one property, the muting rule interprets the properties using the AND logical operator.

  2. Include a Reason for the muting rule. The text you enter in this field is displayed when you hover over a rule in the Muting Rules tab, and can help others understand why alerts are being muted.

  3. Specify the Schedule during which notifications should be muted (muting period) using the predefined periods or by creating a custom period. You can also mute indefinitely.

  4. (Optional) If the rule follows a schedule, you can set a Recurrence period for the muting rule. When scheduling a muting rule, the rule repeats after a set number of days, starting with the start time of the original rule. The daily and weekly options set that number to 1 and 7 respectively. The Custom option lets you set the number of days or set a number of weeks.

  5. Select whether you want to clear any existing alerts that match the conditions you have set. If you’re muting certain alerts to address a known problem, you might want to clear existing alerts so you are starting from a clean slate. Clearing these alerts also notifies downstream systems, such as Splunk On-Call, OpsGenie, and PagerDuty.

  6. Select whether you want to receive notifications for alerts that are still active when the muting period ends.

  7. Select Next to view a summary of the muting conditions. If you want to turn on the muting rule, select Save. It can take up to a minute before a new muting rule goes into effect.

Note

Splunk Observability Cloud allows a maximum of 9,500 muting rules.

Search and view muting rules πŸ”—

You can search existing muting rules and view their details at any time, as well as browse muted notifications.

Active and scheduled muting rules πŸ”—

To find active or scheduled muting rules, use the search field in the Muting Rules tab on the Alerts page.

You can also view information about active and scheduled muting rules from different places on the Alerts page.

  • On the Muting Rules tab, you can view a list of all active and scheduled muting rules.

  • On the Detectors and the Active Alerts tabs, running or scheduled muting rules are indicated by NOTIFICATIONS MUTED labels next to the muted detector. You can select the label to view muting rules for the associated detector.

Note

If you select NOTIFICATIONS MUTED and the Muting Rules tab displays an empty page, then the muting rule was created based on properties instead of created for a detector.

Muted notifications πŸ”—

If a notification was muted, an indicator is displayed wherever the event might send the notification, such as on the Active Alerts tab or in an event feed.

To see events related to past muting rules, you can use the Events sidebar or the Event overlay. Events are generated when the rule becomes active (notifications stop) and when the rule becomes inactive (notifications resume).

  • To find muting events in the Events sidebar, search for sf_eventType:alertMuting.

  • To overlay muting events on a dashboard, search for alertMuting in the Event Overlay search box.

Cancel or delete muting rules πŸ”—

Canceling an active muting rule and resuming notifications for an alert or detector are the same thing. A canceled muting rules is deleted from Splunk Observability Cloud before it expires. Scheduled muting rules that are not yet active can also be deleted before they start.

To cancel an active muting rule or delete a scheduled muting rule from Alerts:

  • Select the Muting Rules tab, and locate the muting rule you want to cancel or delete.

  • Select the more icon (β‹―) next to the muting rule and select Resume Notifications or Delete.

You can also cancel muting rules from a muted alert or detector:

  • On the Active Alerts or the Detectors tab, select the muted or the notifications muted label.

    • For a detector, select the muting rule, then select Resume Notifications.

    • For an active alert, select the more icon (β‹―), then select Resume Notifications.

If there are multiple rules, select the rule for which you want to resume notifications. In each case, you can confirm that you want to resume sending notifications.

This page was last updated on Oct 17, 2024.