Monitoring Splunk

How to get alert when event count of an index is zero

aaa2324
Explorer

Hi Team,

I am trying to setup alert for every 60 min in Splunk whenever the event count of index is zero is encountered.

kindly help with the query.

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @aaa2324,

let me understand: you want an alert that fires when in an hour there isn't any event in an index, is it correct?

If this is your need, please try something like this:

index=your_index earliest=-60m

then you have to set a condition when results=0

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...