- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
How to create an alert if index have no data in the last 24 hours?
mcohen13
Loves-to-Learn
03-01-2020
01:31 AM
I want to create alert to check on all indexes event count and alert the list of all indexes that have no events in the last 24 hours
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

richgalloway

SplunkTrust
03-01-2020
07:04 AM
Search for the following and have the alert trigger if the number of events is not zero.
| tstats count where index=* by index | where count = 0
---
If this reply helps you, Karma would be appreciated.
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
evolart
Engager
09-28-2022
01:40 PM
I'm trying to build a similar alert and when I try below for any time frame up to 24 hours I end up with "No results found". I have 4 indices all showing no events received in over 4 hours when looking at Settings > Indexes.
| tstats count where index=* by index | where count = 0
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
evolart
Engager
09-28-2022
01:44 PM
This solution actually worked for me https://www.splunk.com/en_us/blog/tips-and-tricks/how-to-determine-when-a-host-stops-sending-logs-to....
