<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: If the host is not sending logs to Splunk in Splunk Cloud Platform</title>
    <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540275#M510</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;When i used your query as mentioned Still i can see 400 +hosts reporting with count as 0 for last 15 minutes. But when i checked those servers individually i can see the latest logs in Splunk. I am quite not sure where i am missing it.&lt;/P&gt;</description>
    <pubDate>Wed, 17 Feb 2021 16:16:04 GMT</pubDate>
    <dc:creator>anandhalagaras1</dc:creator>
    <dc:date>2021-02-17T16:16:04Z</dc:date>
    <item>
      <title>If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/537791#M487</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;I want to create and schedule an alert&amp;nbsp; with two scenarios. In first case i have an ample of hosts for which if there is no logs getting ingested into Splunk for more than 15 minutes then it should trigger an email alert.&lt;/P&gt;&lt;P&gt;And another requirement is that the host may be any host (*) and if there are no alerts from any of the host then it should trigger an email to the team.&lt;/P&gt;&lt;P&gt;So for first case consider this data as example :&lt;/P&gt;&lt;P&gt;Host&lt;/P&gt;&lt;P&gt;abc, def, ijk, mne, zda, and so on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So kindly help with the query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 05:45:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/537791#M487</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-01-29T05:45:36Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/537798#M489</link>
      <description>&lt;P&gt;Create a lookup file with the list of hosts, e.g. hosts.csv containing&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;host
abc
def
ghi
jkl
mno
pqr&lt;/LI-CODE&gt;&lt;P&gt;Then your search can be&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Your_base_search_to_get_data
| stats count by host
| append [
  | inputlookup hosts.csv
  | eval count=0
]
| stats values(count) as count by host
| where count=0&lt;/LI-CODE&gt;&lt;P&gt;That will give you all the hosts in hosts.csv that have no data&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you can create the alert based on these results.&lt;/P&gt;&lt;P&gt;I am not sure I understand your second use case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2021 06:43:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/537798#M489</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-01-29T06:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540207#M506</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Apologies for the delayed response.&amp;nbsp; So today as you have mentioned I have created a hosts.csv file with 900+hosts&amp;nbsp; in it. And have ran the query as you have mentioned&amp;nbsp; for last 15 minutes:&lt;/P&gt;&lt;P&gt;index=_internal OR index=*&lt;BR /&gt;| stats count by host&lt;BR /&gt;| append [&lt;BR /&gt;| inputlookup hosts.csv&lt;BR /&gt;| eval count=0&lt;BR /&gt;]&lt;BR /&gt;| stats values(count) as count by host&lt;BR /&gt;| where count=0&lt;/P&gt;&lt;P&gt;I am getting results for 400+ hosts with count as 0. But for sample which I took one of the host from the output and checked&amp;nbsp; in the Search app and&amp;nbsp; I can see the host is reporting with latest timestamp itself without any issues. So why in this query it is getting captured with count as 0. Hence kindly help to guide me on the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 08:51:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540207#M506</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-02-17T08:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540245#M508</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Please try below;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal OR index=*
| stats count by host
| append [
| inputlookup hosts.csv
| eval count=0
]
| stats max(count) as count by host
| where count=0&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 17 Feb 2021 13:30:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540245#M508</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-02-17T13:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540275#M510</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;When i used your query as mentioned Still i can see 400 +hosts reporting with count as 0 for last 15 minutes. But when i checked those servers individually i can see the latest logs in Splunk. I am quite not sure where i am missing it.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 16:16:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540275#M510</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-02-17T16:16:04Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540292#M511</link>
      <description>&lt;P&gt;There may be two options,&lt;/P&gt;&lt;P&gt;1- Case mismatch, let's try converting everything to lowercase.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal OR index=*
| eval host=lower(host)
| stats count by host
| append [
| inputlookup hosts.csv
| eval host=lower(host)
| eval count=0
]
| stats max(count) as count by host
| where count=0&lt;/LI-CODE&gt;&lt;P&gt;2- Your hosts.csv file contains host field a FQDN, if this is the case you should update your hosts.csv with the same way Splunk shows.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 18:05:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540292#M511</guid>
      <dc:creator>scelikok</dc:creator>
      <dc:date>2021-02-17T18:05:31Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540313#M512</link>
      <description>&lt;P&gt;I am not sure why this is the case,&lt;/P&gt;&lt;P&gt;Please replace the final stats with this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| stats max(count) as count by host&lt;/LI-CODE&gt;&lt;P&gt;which will avoid creating multi value fields and see if this changes things.&lt;/P&gt;&lt;P&gt;Also, if you remove the&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| where count=0&lt;/LI-CODE&gt;&lt;P&gt;from the search you will see the maximum value calculated for each search.&lt;/P&gt;&lt;P&gt;Make sure that when you are validating data, the time range you use is the same for each search you run.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 21:01:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540313#M512</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2021-02-17T21:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: If the host is not sending logs to Splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540519#M517</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/206061"&gt;@scelikok&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Nice it works as expected. Thank you for helping me out.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2021 12:47:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Cloud-Platform/If-the-host-is-not-sending-logs-to-Splunk/m-p/540519#M517</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-02-19T12:47:21Z</dc:date>
    </item>
  </channel>
</rss>

