I am trying to setup alert for every 60 min in Splunk whenever the event count of index is zero is encountered.
kindly help with the query.
let me understand: you want an alert that fires when in an hour there isn't any event in an index, is it correct?
If this is your need, please try something like this:
then you have to set a condition when results=0