Splunk Enterprise Security

how to calculate time between events for the past month

sabinayousoubuv
New Member

Hello,

I have an index for a symantec produt, and I have to write a search to alert if any of the sourcetypes doesn't get any data in for a certain amount of time.

Calculating the time is a little tricky for me, since it has to ba searches this way:

Searching for the time differences between all events by sourcetypes for the last month, and make a summary of it.

The alert should apear everytime the index won't get data from a certain sourcetype for longer time than the result from the search above.

I would realy love to get some help,
thank you!

0 Karma

woodcock
Esteemed Legend
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Can’t Make It to Boston? Stream .conf25 and Learn with Haya Husain

Boston may be buzzing this September with Splunk University and .conf25, but you don’t have to pack a bag to ...

Splunk Lantern’s Guide to The Most Popular .conf25 Sessions

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Unlock What’s Next: The Splunk Cloud Platform at .conf25

In just a few days, Boston will be buzzing as the Splunk team and thousands of community members come together ...