Alerting

How to find time delay between one log

muthukumar_covi
New Member

Hi, I'm new to Splunk, I have one log happens frequently, but sometimes log won't come for some short of time. I need to set alert when the log delay happens! how to do that?

That event having _time, host, source, and sourceType.

0 Karma

danan5
Path Finder

Hi,

This might help as a starting point. This looks for hosts that we have seen before and lists them if not seen for the last 24hours. It lisst host, sourcetype, index etc.

| tstats count as countAtToday latest(time) as lastTime where index!="*" by host sourcetype index
| eval age=now()-lastTime
| sort age d
| fieldformat lastTime=strftime(lastTime,"%Y/%m/%d %H:%M:%S") | eval age=round((age/60/60),1)
| search age>=24
| eval age=age."hour"
| dedup host

Adjust thresholds and save as an alert.

Regards,
David

0 Karma

muthukumar_covi
New Member

It's not working

0 Karma

to4kawa
Ultra Champion

Alert : CronExpressions@splunk>docs

It is recommended that you set the schedule, search periodically, and fire an alert if there is no log.
Please refer to the link

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...