I was just wondering if Splunk can be sceheduled to monitor a file regularly, and send out alerts if this file does not get updated for a specific time period , lets say for 5 minutes.
Please help me in doing so, if possible.
Yes, sort-of. I am assuming this file is a logfile, and there are timestamped events in it. If Splunk is indexing this log file you could schedule a saved search with a conditional alert in Splunk that does something like: