Alerting

Splunk alert if no events in source returned in X time

markgomez00
Explorer

Hi I was wondering if it is possible on splunk to search for a specific message on a source/log then alert if the last event received was more than 2 minute ago

my search string is:

  index=[index] host=[host] sourcetype=[sourcetype] "Keyword"

I'm searching for the word "Keyword" and i want to set an alert if the last result is more than 2 minutes ago

Thanks in advance

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

How about narrowing your search to the last 2 minutes and setting an alert if there are no results?

---
If this reply helps you, Karma would be appreciated.
0 Karma

markgomez00
Explorer

Hi @richgalloway thanks for your response,

I tried narrowing it to 2 minutes by adding 'earliest=-2m latest=now()' to my search, i have set it to run every 1 minute and if the result is 0 the alert should trigger, but sometimes the alert is triggering even if the results is > 0, is this a problem on timing?

note: the keyword is generated every 1 minute

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...