Splunk Enterprise Security

Query for data sources not reporting an event in a specific time period.

staparia
Explorer

Hi,

I would request a query where if a log source has stopped sending an event to splunk for a specific time period, it should alert me.

Example index=proxy sourcetype=test_5 not giving any result for last 15 mins.

0 Karma

paramagurukarth
Builder
index=*| stats count as event_count by sourcetype |append[|metadata type=sourcetypes index=* OR index=_*| eval event_count=coalesce(event_count, 0) | table sourcetype,event_count] | where event_count = 0
0 Karma

renjith_nair
Legend

@staparia ,

index=proxy sourcetype=test_5 earliest=-15m|stats count|where count > 0

Set an alert for 'No of events is less than 0'

Happy Splunking!
0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...