Is there a way to send an alert if there is no logs coming for more than 10min for a source type.
Yes. Search for your sourcetype, save the search and create an alert from it, scheduled to run every 10 minutes. This is covered in the manual here: http://www.splunk.com/base/Documentation/latest/User/SchedulingSavedSearches
As alert criteria, choose that the number of events for your search should equal 0. If no events are recorded in the 10 minutes between the scheduled searches, the alert will be triggered.