Monitoring Splunk

How to get alert when event count of an index is zero

aaa2324
Explorer

Hi Team,

I am trying to setup alert for every 60 min in Splunk whenever the event count of index is zero is encountered.

kindly help with the query.

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @aaa2324,

let me understand: you want an alert that fires when in an hour there isn't any event in an index, is it correct?

If this is your need, please try something like this:

index=your_index earliest=-60m

then you have to set a condition when results=0

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...