Splunk Search

Alert when count = 0

SplunkUser5888
Path Finder

Hi guys, I've seen similar questions and answers but can't get around them. My question is simple... I guess.

I am searching antivirus logs to see if the scan is being run daily. If it is not, then I would like to register and alert in Splunk. My search is as follows:

host=server2003-splu sourcetype=fs_notification index=_audit Defender\\Scans\\History action=update | stats count

I would like a way to have an alert if count = 0

Thanks for any help

Tags (1)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

Instead of computing the count yourself you can create an alert that runs daily and is triggered if the number of results is equal to zero.

View solution in original post

martin_mueller
SplunkTrust
SplunkTrust

Instead of computing the count yourself you can create an alert that runs daily and is triggered if the number of results is equal to zero.

SplunkUser5888
Path Finder

Thanks so much, I knew it had to be something simple, my bad

0 Karma

SplunkUser5888
Path Finder

PS: I've tried | where count<1 but that doesn't seem to work

0 Karma
Get Updates on the Splunk Community!

Modernize your Splunk Apps – Introducing Python 3.13 in Splunk

We are excited to announce that the upcoming releases of Splunk Enterprise 10.2.x and Splunk Cloud Platform ...

New Release | Splunk Cloud Platform 10.1.2507

Hello Splunk Community!We are thrilled to announce the General Availability of Splunk Cloud Platform 10.1.2507 ...

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

&#x1f5e3; You Spoke, We Listened  Audit Trail v2 wasn’t written in isolation—it was shaped by your voices.  In ...