<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/545825#M154698</link>
    <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;You can schedule the below search which identifies hosts that are not sending any data in the last 15 minutes for every 15 minutes.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count where index=xyz sourcetype=iis earliest=-15m by host 
| append 
    [| makeresults 
    | eval host=split("abc,def,ijk,lmn,opq", ",") 
    | mvexpand host 
    | eval count=0] 
| stats sum(count) as event_count by host 
| where event_count=0 
| mvcombine delim="," host 
| nomv host&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configure email alert action with the message:&lt;BR /&gt;&lt;STRONG&gt;Data is not received in&amp;nbsp;&amp;nbsp;index=xyz and with sourcetype=iis&amp;nbsp; from hosts: $result.host$.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this reply helps you, a like would be appreciated.&lt;/P&gt;</description>
    <pubDate>Mon, 29 Mar 2021 08:23:23 GMT</pubDate>
    <dc:creator>manjunathmeti</dc:creator>
    <dc:date>2021-03-29T08:23:23Z</dc:date>
    <item>
      <title>Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/545797#M154685</link>
      <description>&lt;P&gt;Hi Team&lt;/P&gt;&lt;P&gt;I have set of 5 hosts which are coming from an index=xyz and with sourcetype=iis so for example if any of the host logs from index=xyz and sourcetype=iis is getting stopped then we need to get an email notification from which server the logs has stopped getting ingested into splunk.&lt;/P&gt;&lt;P&gt;Timespan is for last 15 minutes.&lt;/P&gt;&lt;P&gt;5 host information:&lt;/P&gt;&lt;P&gt;abc, def, ijk, lmn, opq.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So can you kindly help to build the query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 05:25:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/545797#M154685</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-29T05:25:03Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/545825#M154698</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/207926"&gt;@anandhalagaras1&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;You can schedule the below search which identifies hosts that are not sending any data in the last 15 minutes for every 15 minutes.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count where index=xyz sourcetype=iis earliest=-15m by host 
| append 
    [| makeresults 
    | eval host=split("abc,def,ijk,lmn,opq", ",") 
    | mvexpand host 
    | eval count=0] 
| stats sum(count) as event_count by host 
| where event_count=0 
| mvcombine delim="," host 
| nomv host&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configure email alert action with the message:&lt;BR /&gt;&lt;STRONG&gt;Data is not received in&amp;nbsp;&amp;nbsp;index=xyz and with sourcetype=iis&amp;nbsp; from hosts: $result.host$.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this reply helps you, a like would be appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Mar 2021 08:23:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/545825#M154698</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2021-03-29T08:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/546009#M154761</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/129090"&gt;@manjunathmeti&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;But when i checked the query as you mentioned i am getting an error as below:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Error in 'eval' command: The arguments to the 'split' function are invalid.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So kindly help on the same.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Mar 2021 13:02:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/546009#M154761</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-03-30T13:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/546119#M154790</link>
      <description>&lt;P&gt;Post your query.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Mar 2021 05:01:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/546119#M154790</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2021-03-31T05:01:56Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547151#M155122</link>
      <description>&lt;P&gt;&amp;nbsp;Sorry for the delay.&lt;/P&gt;&lt;P&gt;This is the query which I have used to search the logs and which in turn throwed an error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;| tstats count where index=xyz sourcetype=iis earliest=-15m by host&lt;BR /&gt;| append&lt;BR /&gt;[| makeresults&lt;BR /&gt;| eval host=split("abc,def,ijk,lmn,opq")&lt;BR /&gt;| mvexpand host&lt;BR /&gt;| eval count=0]&lt;BR /&gt;| stats sum(count) as event_count by host&lt;BR /&gt;| where event_count=0&lt;BR /&gt;| mvcombine delim="," host&lt;BR /&gt;| nomv host&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error Information:&lt;/P&gt;&lt;DIV class="alerts search-searchflashmessages"&gt;&lt;DIV class="alert alert-error"&gt;Error in 'eval' command: The arguments to the 'split' function are invalid.&lt;DIV class="job-status-container"&gt;&lt;DIV class="shared-jobstatus"&gt;&lt;DIV class="alert alert-error"&gt;The search job has failed due to an error. You may be able view the job in the&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;Job Inspector.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class="alert alert-error"&gt;&amp;nbsp;&lt;DIV class="alert alert-error"&gt;&lt;SPAN&gt;So kindly help to correct me where i am wrong.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/129090"&gt;@manjunathmeti&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 05:56:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547151#M155122</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-04-08T05:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547152#M155123</link>
      <description>&lt;P&gt;you need to provide a delimiter in the split function.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats count where index=xyz sourcetype=iis earliest=-15m by host
| append
[| makeresults
| eval host=split("abc,def,ijk,lmn,opq", ",")
| mvexpand host
| eval count=0]
| stats sum(count) as event_count by host
| where event_count=0
| mvcombine delim="," host
| nomv host&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 06:35:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547152#M155123</guid>
      <dc:creator>manjunathmeti</dc:creator>
      <dc:date>2021-04-08T06:35:59Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547184#M155133</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/129090"&gt;@manjunathmeti&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thank you &amp;amp; now I can able to see some results. Here in my case I have ran the below mentioned query for last 60 minutes and currently I can see latest logs for sourcetype iis in splunk for all the hosts.&amp;nbsp;&lt;/P&gt;&lt;P&gt;index=xyz sourcetype=iis&lt;/P&gt;&lt;P&gt;But if i use the query which you have provided I can see some result as below:&lt;/P&gt;&lt;P&gt;host&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; event_count&lt;BR /&gt;ijk,lmn&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;/P&gt;&lt;P&gt;But actually there are latest logs in splunk for ijk,lmn host for last 60 minutes but here in this case it shows the event_count as 0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure about it. So kindly help to check and update me on the same.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 12:59:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547184#M155133</guid>
      <dc:creator>anandhalagaras1</dc:creator>
      <dc:date>2021-04-08T12:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: Search Query to trigger an email of the host is not reporting in Splunk for last 15 minutes</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547194#M155138</link>
      <description>&lt;P&gt;I do this with sparkline. It's not based on time but on log count in the _internal index. No logs being sent by host in _internal generally means something is wrong. This isn't the 15m solution you were looking for but wanted to share in case you wanted to implement something similar. You could use &lt;STRONG&gt;bin&lt;/STRONG&gt; to create 15m buckets of &lt;STRONG&gt;_time&lt;/STRONG&gt;.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=_internal sourcetype=splunkd destPort!="-" 
| stats sparkline count by hostname, sourceHost, host, destPort, version 
| rename destPort as "Destination Port", host as "Indexer", sourceHost as "Forwarder IP", version as "Splunk Forwarder Version", hostname as "Forwarder Host Name", sparkline as "Traffic Frequency"
| dedup "Forwarder Host Name" 
| sort - count
| where count &amp;lt; 20&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;You can play around with the count as well. I try to look for forwarders that aren't just completely dead but aren't communicating as much as normal as well.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 13:32:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-Query-to-trigger-an-email-of-the-host-is-not-reporting-in/m-p/547194#M155138</guid>
      <dc:creator>96nick</dc:creator>
      <dc:date>2021-04-08T13:32:26Z</dc:date>
    </item>
  </channel>
</rss>

