How to best choose time-range to handle the delayed events for Splunk alerts to ensure that no events got skipped and no events are repeated effectively.
There are many simple solution our there and there are some Apps and sophisticated solutions which makes use of KVstore to keep track of delayed events and other stuff, but I found them too complicated to use effectively across all the alerts.
Here is the solution that I have been effectively using in many Splunk environments that I work on:
Please let me know if I'm missing any scenarios. Or paste any other solution that you have for other users on the community.
There are many simple solution our there and there are some Apps and sophisticated solutions which makes use of KVstore to keep track of delayed events and other stuff, but I found them too complicated to use effectively across all the alerts.
Here is the solution that I have been effectively using in many Splunk environments that I work on:
Please let me know if I'm missing any scenarios. Or paste any other solution that you have for other users on the community.