Getting Data In

Network latency

peter_gianusso
Communicator

Regardless of one's approach with collecting data, Splunk is heavily dependent on the network.

How does one deal with infrequent network latency? It will disrupt one's alerts because the dispatch earliest time will not be back far enough to catch the events that should have been alerted on.

Is there a way to dynamically change the dispatch earliest time based on the network latency?

Any other approaches?

0 Karma

lukejadamec
Super Champion

In addition to network latency, you can also run into problems with index latency. I am not aware of a way to dynamically change the search time frame. However, one solution to both is to change the latest time from "now" to something like -2m@s, and adjust the earliest time accordingly. This example will compensate for 2 minutes of latency regardless of the cause.

0 Karma

peter_gianusso
Communicator

thanks that was my approach already but since latency is variable, hardcoding a time does not really work

dbylertbg
Path Finder

Agreed. It would be great to be able to have an option for time range of "automatic". If you then set the search to run every 10 minutes, it should set the time earliest time to -10m + max latency over the last period for the sourcetypes that will be used in the search. Splunk, can you make this a feature??

0 Karma
Get Updates on the Splunk Community!

What’s New in Splunk Enterprise 9.4: Tools for Digital Resilience

What’s New in Splunk Enterprise 9.4: Tools for Digital ResilienceTune in to What’s New in Splunk Enterprise ...

Get Schooled with Splunk Education: Explore Our Latest Courses

At Splunk Education, we’re dedicated to providing incredible learning experiences that cater to every skill ...

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL

Splunk AI Assistant for SPL | Key Use Cases to Unlock the Power of SPL  The Splunk AI Assistant for SPL ...