Splunk Enterprise Security

How to create an alert if index have no data in the last 24 hours?

mcohen13
Loves-to-Learn

I want to create alert to check on all indexes event count and alert the list of all indexes that have no events in the last 24 hours

0 Karma

richgalloway
SplunkTrust
SplunkTrust

Search for the following and have the alert trigger if the number of events is not zero.

| tstats count where index=* by index | where count = 0
---
If this reply helps you, Karma would be appreciated.
0 Karma

evolart
Engager

I'm trying to build a similar alert and when I try below for any time frame up to 24 hours I end up with "No results found". I have 4 indices all showing no events received in over 4 hours when looking at Settings > Indexes.

| tstats count where index=* by index | where count = 0

 

Tags (3)
0 Karma

evolart
Engager
0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...