<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to create an alert when searched index has no data in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455721#M128857</link>
    <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*license_usage.log type="Usage" 
| timechart count by idx span=1h
| untable _time idx count
| where count = 0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Sat, 17 Aug 2019 14:45:40 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2019-08-17T14:45:40Z</dc:date>
    <item>
      <title>How to create an alert when searched index has no data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455719#M128855</link>
      <description>&lt;P&gt;I have the following search, and i want to be able to only show the indexes that have 0 data during a specified time frame.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*license_usage.log type="Usage" 
| timechart count by idx span=1h
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;When I add  &lt;CODE&gt;| where count=0&lt;/CODE&gt;  or something similar it shows nothing.&lt;/P&gt;

&lt;P&gt;Any example searches to show indexes that have no data and be able to set up an alert when that happens?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 19:00:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455719#M128855</guid>
      <dc:creator>dmws</dc:creator>
      <dc:date>2019-08-16T19:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert when searched index has no data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455720#M128856</link>
      <description>&lt;P&gt;try this : &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| eventcount summarize=false index=* 
| dedup index 
| fields index 
| rename index as idx 
| join type=left idx 
    [ search index=_internal source=*license_usage.log type="Usage" 
    | bin span=1d _time 
    | eval time=strftime(_time,"%Y-%d-%m") 
    | chart count over idx by time ]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;let me know if this helps !&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 22:28:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455720#M128856</guid>
      <dc:creator>mayurr98</dc:creator>
      <dc:date>2019-08-16T22:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert when searched index has no data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455721#M128857</link>
      <description>&lt;P&gt;Like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal source=*license_usage.log type="Usage" 
| timechart count by idx span=1h
| untable _time idx count
| where count = 0
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 17 Aug 2019 14:45:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455721#M128857</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-08-17T14:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert when searched index has no data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455722#M128858</link>
      <description>&lt;P&gt;It sort of works, but there are a lot of blank spaces under the counts for some indexes&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 17:28:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455722#M128858</guid>
      <dc:creator>dmws</dc:creator>
      <dc:date>2019-08-19T17:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to create an alert when searched index has no data</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455723#M128859</link>
      <description>&lt;P&gt;blank space occurs where there is no count for a specific index. append  |fillnull value=0  to the above query&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 17:34:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-when-searched-index-has-no-data/m-p/455723#M128859</guid>
      <dc:creator>Sukisen1981</dc:creator>
      <dc:date>2019-08-19T17:34:07Z</dc:date>
    </item>
  </channel>
</rss>

