Alerting

Log inactivity

harishd
Explorer

Hi

Is there a way to send an alert if there is no logs coming for more than 10min for a source type.

Regards,
Harish

Tags (2)

Ayn
Legend

Yes. Search for your sourcetype, save the search and create an alert from it, scheduled to run every 10 minutes. This is covered in the manual here: http://www.splunk.com/base/Documentation/latest/User/SchedulingSavedSearches

As alert criteria, choose that the number of events for your search should equal 0. If no events are recorded in the 10 minutes between the scheduled searches, the alert will be triggered.

Get Updates on the Splunk Community!

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...

Fun with Regular Expression - multiples of nine

Fun with Regular Expression - multiples of nineThis challenge was first posted on Slack #regex channel ...