<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds in Splunk ITSI</title>
    <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436942#M1295</link>
    <description>&lt;P&gt;@sail4lot,&lt;/P&gt;

&lt;P&gt;Please find &lt;A href="https://docs.splunk.com/Documentation/ITSI/4.2.1/Configure/AddKPIs#Step_5:_Unit_and_Monitoring_Lag"&gt;what is monitoring lag&lt;/A&gt;. You can create KPI based on your data, there is no restriction in writing KPI base-search or adhoc search. As far as your search is not missing any data or considering duplicate data you can use that search.&lt;/P&gt;

&lt;P&gt;Hope this helps!!!&lt;/P&gt;</description>
    <pubDate>Mon, 24 Jun 2019 13:44:09 GMT</pubDate>
    <dc:creator>VatsalJagani</dc:creator>
    <dc:date>2019-06-24T13:44:09Z</dc:date>
    <item>
      <title>Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436939#M1292</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;
We have data that always get indexed at a rate greater than 1800 seconds old (the maximum monitoring lag permitted). This is due to a variety of issues from the frequency of data getting generated to transport. &lt;/P&gt;

&lt;P&gt;What is the recommended way to create a KPI that takes a count of events over 15 minutes that have a timestamp from 45 to 60 minutes before "now" run every 15 minutes? &lt;BR /&gt;
I have tried specifically setting  &lt;CODE&gt;"earliest=-60m@m latest=-45m@m"&lt;/CODE&gt; which seems to capture the data (monitoring lag = 0). Is this the right way to handle such a case?&lt;/P&gt;

&lt;P&gt;Secondary to that is there affect on the upstream service analyzer score? The service I have running like this always has a score of N/A which I'm thinking has something to do with timing.&lt;/P&gt;

&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 09:46:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436939#M1292</guid>
      <dc:creator>sail4lot</dc:creator>
      <dc:date>2019-06-21T09:46:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436940#M1293</link>
      <description>&lt;P&gt;you can use &lt;CODE&gt;_index_earliest&lt;/CODE&gt;&lt;BR /&gt;
see here&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/Splunk/7.3.0/SearchReference/SearchTimeModifiers"&gt;https://docs.splunk.com/Documentation/Splunk/7.3.0/SearchReference/SearchTimeModifiers&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jun 2019 19:03:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436940#M1293</guid>
      <dc:creator>adonio</dc:creator>
      <dc:date>2019-06-21T19:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436941#M1294</link>
      <description>&lt;P&gt;This might work. Does anyone know what ITSI uses in its lag calculations? Index time or timestamp? For example, if I specify a search lag of 10 minutes, is that searching for timestamps 10 minutes ago or index times 10 minutes ago? Will make a big difference.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 10:18:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436941#M1294</guid>
      <dc:creator>sail4lot</dc:creator>
      <dc:date>2019-06-24T10:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436942#M1295</link>
      <description>&lt;P&gt;@sail4lot,&lt;/P&gt;

&lt;P&gt;Please find &lt;A href="https://docs.splunk.com/Documentation/ITSI/4.2.1/Configure/AddKPIs#Step_5:_Unit_and_Monitoring_Lag"&gt;what is monitoring lag&lt;/A&gt;. You can create KPI based on your data, there is no restriction in writing KPI base-search or adhoc search. As far as your search is not missing any data or considering duplicate data you can use that search.&lt;/P&gt;

&lt;P&gt;Hope this helps!!!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 13:44:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436942#M1295</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2019-06-24T13:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436943#M1296</link>
      <description>&lt;P&gt;@VatsalJagani Thanks for that. I have read that about 15 times. It all makes sense. I guess it means that the lag you are accounting for is done via the event timestamp not the index time. &lt;/P&gt;

&lt;P&gt;In 3.1.4, this is limited to 1799 seconds in the UI. My question is what is the best approach to account for lags that are longer than this. In a base search do I just use earliest and latest? Do I hack the shared saved search that is resultant from the base search?&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jun 2019 21:08:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436943#M1296</guid>
      <dc:creator>sail4lot</dc:creator>
      <dc:date>2019-06-24T21:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk IT Service Intelligence: Different monitoring frequencies and lag beyond 1800 seconds</title>
      <link>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436944#M1297</link>
      <description>&lt;P&gt;If you know your events are lagging more than that always than yeah you can use the earliest and latest in your query.&lt;BR /&gt;
But if your data is lagging more than that then you need to once check your data source. Ideally, it should not lag longer.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 03:54:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-ITSI/Splunk-IT-Service-Intelligence-Different-monitoring-frequencies/m-p/436944#M1297</guid>
      <dc:creator>VatsalJagani</dc:creator>
      <dc:date>2019-06-25T03:54:42Z</dc:date>
    </item>
  </channel>
</rss>

