<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alert for specific missing events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Alert-for-specific-missing-events/m-p/690020#M235060</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228757"&gt;@marco_massari11&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you should run something ike this (if the search is only on index, host, source and sourcetype&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats 
     count
     WHERE index=your_index
     BY host
| append [ | inputlookup your_lookup.csv | eval count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;If you have to use a more comples search, you can use&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your_search&amp;gt;
| stats count BY host
| append [ | inputlookup your_lookup.csv | eval count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2024 15:03:58 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2024-06-07T15:03:58Z</dc:date>
    <item>
      <title>Alert for specific missing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-for-specific-missing-events/m-p/690004#M235059</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I need to monitor some critical devices (stored in a lookup file) connected to the Crowdstrike console, in particular if they will be disconnected from it. We receive one event every 2 hours for each device from Crowdstrike device json input in Splunk, so basically if after 2 hours there is not the new event, the alert should trigger reporting the hostname. Has anyone some idea for implementing this?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 14:54:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-for-specific-missing-events/m-p/690004#M235059</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2024-06-07T14:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: Alert for specific missing events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Alert-for-specific-missing-events/m-p/690020#M235060</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/228757"&gt;@marco_massari11&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you should run something ike this (if the search is only on index, host, source and sourcetype&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| tstats 
     count
     WHERE index=your_index
     BY host
| append [ | inputlookup your_lookup.csv | eval count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;If you have to use a more comples search, you can use&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;your_search&amp;gt;
| stats count BY host
| append [ | inputlookup your_lookup.csv | eval count=0 | fields host count ]
| stats sum(count) AS total BY host
| where total=0&lt;/LI-CODE&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 15:03:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Alert-for-specific-missing-events/m-p/690020#M235060</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-06-07T15:03:58Z</dc:date>
    </item>
  </channel>
</rss>

