Monitoring Splunk

How to get alert when event count of an index is zero


Hi Team,

I am trying to setup alert for every 60 min in Splunk whenever the event count of index is zero is encountered.

kindly help with the query.

Labels (1)
0 Karma


Hi @aaa2324,

let me understand: you want an alert that fires when in an hour there isn't any event in an index, is it correct?

If this is your need, please try something like this:

index=your_index earliest=-60m

then you have to set a condition when results=0



0 Karma
Get Updates on the Splunk Community!

Introducing Ingest Actions: Filter, Mask, Route, Repeat

WATCH NOW Ingest Actions (IA) is the best new way to easily filter, mask and route your data in Splunk® ...

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...