Getting Data In

Network latency

peter_gianusso
Communicator

Regardless of one's approach with collecting data, Splunk is heavily dependent on the network.

How does one deal with infrequent network latency? It will disrupt one's alerts because the dispatch earliest time will not be back far enough to catch the events that should have been alerted on.

Is there a way to dynamically change the dispatch earliest time based on the network latency?

Any other approaches?

0 Karma

lukejadamec
Super Champion

In addition to network latency, you can also run into problems with index latency. I am not aware of a way to dynamically change the search time frame. However, one solution to both is to change the latest time from "now" to something like -2m@s, and adjust the earliest time accordingly. This example will compensate for 2 minutes of latency regardless of the cause.

0 Karma

peter_gianusso
Communicator

thanks that was my approach already but since latency is variable, hardcoding a time does not really work

dbylertbg
Path Finder

Agreed. It would be great to be able to have an option for time range of "automatic". If you then set the search to run every 10 minutes, it should set the time earliest time to -10m + max latency over the last period for the sourcetypes that will be used in the search. Splunk, can you make this a feature??

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...