Alerting

How to write a Splunk alert query to trigger alert when there are no transactions?

aaa2324
Explorer

I want to create Splunk alert when there are no transactions continuously for 30mins. Kindly assist.

Labels (1)

mehmetgunertr
Explorer
index="abc" (EVENT=1 OR EVENT=2)| transaction MACHINE startswith=(EVENT=1) endswith=(EVENT=2)|where duration> 1800 | table  duration  EVENT MACHINE NAME DESCR
0 Karma

aaa2324
Explorer

Can you please explain how the below query works , what is event=1 and 2 and what is machine ?

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Create a report that counts the transactions in the previous 30 minutes and trigger the alarm when the count is zero

Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...