Splunk Enterprise Security
Highlighted

alert if index have no data in the last 24 hours

New Member

I want to create alert to check on all indexes event count and alert the list of all indexes that have no events in the last 24 hours

0 Karma
Highlighted

Re: alert if index have no data in the last 24 hours

SplunkTrust
SplunkTrust

Search for the following and have the alert trigger if the number of events is not zero.

| tstats count where index=* by index | where count = 0
---
If this reply helps you, an upvote would be appreciated.
0 Karma