Splunk Search

How to ignore delayed events in splunk alert and alert only if log is actually missing?

rohit_d
Engager

I have splunk query which runs every 5 minutes and alert if certain keyword is not logged in index in last 5 minutes. But whenever there are splunk event delays it causes false alert to trigger. Is there any way i can differentiate if keyword is really not logged or is it due to latency in events .
I tried using (_indextime - _time) but this will only work once event is received.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Allow time for events to be indexed by searching earliest=-6m latest=-1m instead of earliest=-5m latest=now.

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...