Splunk Search

Create Saved Search For A Files Time Stamp

itsquinj
New Member

Splunk univerisal forwarder is installed on a linux server. This server is indexing a number of files. I need to create a Saved Search to search on the time stamp of two of the files. If the time stamp of the files is 20 minutes old then it tells me a process is not running on the Linux server.

Would anyone know how to create such a saved search.

Tags (2)
0 Karma

woodcock
Esteemed Legend

You can look at _indextime to see when the file was forwarded but the only way to get the timestamp of the file is if it is encoded in the filename or in data inside the file. But you could do something like this

index=myIndex (source=source1 OR source=source2) | stats latest(_time) AS latestTime BY source | eval waitingSecs = now() -  latestTime | where watingSecs > 1200

Then save this search as an alert and run it every X minutes for the last hour (-1h) and have it email you whenever numevents>0.

0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...