Alerting

How do I trigger an alert if no event is received after a certain time?

alexchandb
Engager

Our splunk instance is receiving events / log information via UDP. Is it possible to trigger an email alert if I have not received events after a certain period of time?

0 Karma
1 Solution

adonio
Ultra Champion

pasting to an answer
hello,
how about something like that:

 <your search for events for this data> earliest= latest=now | stats count 

save the alert and trigger if count = 0

View solution in original post

adonio
Ultra Champion

pasting to an answer
hello,
how about something like that:

 <your search for events for this data> earliest= latest=now | stats count 

save the alert and trigger if count = 0

adonio
Ultra Champion

hello,
how about something like that:

<your search for events for this data> earliest= latest=now | stats count 

save the alert and trigger if count = 0

alexchandb
Engager

this worked thank you

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to January Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...