Best way to alert for not receiving data from a source?



I was think of the possible ways to alert in Splunk whe it hos not received any data for a time period ie 30mins meaning the thedevice maybe down.

Has anybody already done this, or have any ideas?

Tags (3)
0 Karma

Ultra Champion

Have you check out the DeploymentMonitor app. It ships with Splunk, but is not enabled by default.

To enable it, go to Manager -> Apps and click 'enable' for the SplunkDeploymentMonitor

Then you can choose DeploymentMonitor in the 'Apps' menu (it will not have much data to show right away, since it works with scheduled searches). You can set up alerts for 'quiet' or 'missing' forwarders.

Hope this helps,


Ultra Champion

Note that as of version 5, DeploymentMonitor has to be downloaded separately. This can be done through the Manager. /k

0 Karma

Splunk Employee
Splunk Employee

Check out this previous Splunkbase answer. You can create an alert based on that search. You'll just need to adjust the time to be 'age > 1800' for 30 minutes.

| metadata index=main type=hosts | eval age = now()-lastTime | where age > (2*86400) | sort age d | convert ctime(lastTime) | fields age,host,lastTime

0 Karma
Get Updates on the Splunk Community!

Admin Your Splunk Cloud, Your Way

Join us to maximize different techniques to best tune Splunk Cloud. In this Tech Enablement, you will get ...

Cloud Platform | Discontinuing support for TLS version 1.0 and 1.1

Overview Transport Layer Security (TLS) is a security communications protocol that lets two computers, ...

New Customer Testimonials

Enterprises of all sizes and across different industries are accelerating cloud adoption by migrating ...