May 23 2022 12:40 AM
Hi team,
We have an analytics rule that will run every hour. We have configured the alert grouping to "Grouping alerts into a single incident if all the entities match" for the 7-day time frame.
However, the incidents are keeping triggering every hour. May I know if there is any approach to troubleshoot the issue or how to check the config? Thanks
May 23 2022 04:14 AM
@Steven_Su Have you verified that the incidents in each alert matches exactly (number and names) to the one another?
May 23 2022 08:23 PM
Hi @Gary Bushey
Yes, for example, i search the IP entity and find all the incidents related to it. They only have 1 entity and it is the same, but the alerts were not aggregated into a single incident.
May 24 2022 04:37 AM
May 24 2022 06:51 PM
May 25 2022 03:41 AM
SolutionMay 26 2022 02:05 AM
Aug 07 2023 10:15 AM
Aug 08 2023 08:51 AM
@Steven_Su
Hello Steven,
I have similar problem but in my case I don't have automation and sentinel is not grouping the alerts even though the entity is matching, so can you please let me know is the entity you are using in this rule client_ipaddress_s a list of IPs or single IP?