<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Search based on zero events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745779#M241541</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/310018"&gt;@u_m1580&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would look at using a tstats search as this will be more performant when there is data in the index.&lt;/P&gt;&lt;P&gt;Something simple such as:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count where index=&amp;lt;yourIndex&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Then you can alert where count=0, or add a | where count&amp;gt;0 and alert when there are no results.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
    <pubDate>Thu, 08 May 2025 12:39:46 GMT</pubDate>
    <dc:creator>livehybrid</dc:creator>
    <dc:date>2025-05-08T12:39:46Z</dc:date>
    <item>
      <title>Search based on zero events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745769#M241535</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;I would like to create a search to alert us based on an index not ingesting any event data by basing it off any field in our index&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 10:31:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745769#M241535</guid>
      <dc:creator>u_m1580</dc:creator>
      <dc:date>2025-05-08T10:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Search based on zero events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745770#M241536</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/310018"&gt;@u_m1580&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;you could create an alert using a simple search&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your_index&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;that triggers if you have no events.&lt;/P&gt;&lt;P&gt;If you need to check a list of hosts, it's different.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 10:33:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745770#M241536</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-05-08T10:33:51Z</dc:date>
    </item>
    <item>
      <title>Re: Search based on zero events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745779#M241541</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/310018"&gt;@u_m1580&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would look at using a tstats search as this will be more performant when there is data in the index.&lt;/P&gt;&lt;P&gt;Something simple such as:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|tstats count where index=&amp;lt;yourIndex&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;Then you can alert where count=0, or add a | where count&amp;gt;0 and alert when there are no results.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":glowing_star:"&gt;🌟&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Did this answer help you?&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If so, please consider:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Adding karma to show it was useful&lt;/LI&gt;&lt;LI&gt;Marking it as the solution if it resolved your issue&lt;/LI&gt;&lt;LI&gt;Commenting if you need any clarification&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Your feedback encourages the volunteers in this community to continue contributing&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 12:39:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Search-based-on-zero-events/m-p/745779#M241541</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-05-08T12:39:46Z</dc:date>
    </item>
  </channel>
</rss>

