Splunk Enterprise Security

how to calculate time between events for the past month

sabinayousoubuv
New Member

Hello,

I have an index for a symantec produt, and I have to write a search to alert if any of the sourcetypes doesn't get any data in for a certain amount of time.

Calculating the time is a little tricky for me, since it has to ba searches this way:

Searching for the time differences between all events by sourcetypes for the last month, and make a summary of it.

The alert should apear everytime the index won't get data from a certain sourcetype for longer time than the result from the search above.

I would realy love to get some help,
thank you!

0 Karma

woodcock
Esteemed Legend
0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...