Monitoring Splunk

Log sources not reporting

sahildb
Engager

Currently our index= windows host not reporting from last couple of days.

 

Need query to set up alert if log sources are not reporting to splunk.

Labels (1)
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @sahildb,

You can use below query to find hosts that is not reporting for 60 minutes by host, index and sourcetype.

| tstats max(_time) as _time where index=* by index host sourcetype | where _time < relative_time(now(),"-60m")

 You can adapt 60 minutes timeout and indexes to your need. 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

scelikok
SplunkTrust
SplunkTrust

Hi @sahildb,

You can use Broken Hosts app to monitor your data ingestion problems,

https://splunkbase.splunk.com/app/3247/

 

If this reply helps you an upvote and "Accept as Solution" is appreciated.
0 Karma

sahildb
Engager

Is there any query we can use to detect ?

0 Karma

sahildb
Engager

Thanks for the solution i think will recommend the same to team.

 

 

0 Karma

sahildb
Engager

Need to verify and set up alert which index generate data and or not and how we can monitor

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...