Monitoring Splunk

How to get alert when event count of an index is zero

aaa2324
Explorer

Hi Team,

I am trying to setup alert for every 60 min in Splunk whenever the event count of index is zero is encountered.

kindly help with the query.

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @aaa2324,

let me understand: you want an alert that fires when in an hour there isn't any event in an index, is it correct?

If this is your need, please try something like this:

index=your_index earliest=-60m

then you have to set a condition when results=0

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Aligning Observability Costs with Business Value: Practical Strategies

 Join us for an engaging Tech Talk on Aligning Observability Costs with Business Value: Practical ...

Mastering Data Pipelines: Unlocking Value with Splunk

 In today's AI-driven world, organizations must balance the challenges of managing the explosion of data with ...

Splunk Up Your Game: Why It's Time to Embrace Python 3.9+ and OpenSSL 3.0

Did you know that for Splunk Enterprise 9.4, Python 3.9 is the default interpreter? This shift is not just a ...