Splunk Enterprise Security

How to create an alert if index have no data in the last 24 hours?

mcohen13
Loves-to-Learn

I want to create alert to check on all indexes event count and alert the list of all indexes that have no events in the last 24 hours

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Search for the following and have the alert trigger if the number of events is not zero.

| tstats count where index=* by index | where count = 0
---
If this reply helps you, Karma would be appreciated.
0 Karma

evolart
Engager

I'm trying to build a similar alert and when I try below for any time frame up to 24 hours I end up with "No results found". I have 4 indices all showing no events received in over 4 hours when looking at Settings > Indexes.

| tstats count where index=* by index | where count = 0

 

Tags (3)
0 Karma

evolart
Engager
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...