Alerting

Log inactivity

harishd
Explorer

Hi

Is there a way to send an alert if there is no logs coming for more than 10min for a source type.

Regards,
Harish

Tags (2)

Ayn
Legend

Yes. Search for your sourcetype, save the search and create an alert from it, scheduled to run every 10 minutes. This is covered in the manual here: http://www.splunk.com/base/Documentation/latest/User/SchedulingSavedSearches

As alert criteria, choose that the number of events for your search should equal 0. If no events are recorded in the 10 minutes between the scheduled searches, the alert will be triggered.

Get Updates on the Splunk Community!

Splunk Enterprise Security: Your Command Center for PCI DSS Compliance

Every security professional knows the drill. The PCI DSS audit is approaching, and suddenly everyone's asking ...

Developer Spotlight with Guilhem Marchand

From Splunk Engineer to Founder: The Journey Behind TrackMe    After spending over 12 years working full time ...

Cisco Catalyst Center Meets Splunk ITSI: From 'Payments Are Down' to Root Cause in ...

The Problem: When Networks and Services Don't Talk Payment systems fail at a retail location. Customers are ...