Splunk Search

How to create alert on if log message does not appear?

batham
Explorer

Hi,

I have a splunk source which does have data ingestion from multiple servers, i want to setup an alert on that source on a specific condition that if a particular message does not appear for 6 hour alert should be triggered

below is an example to search the string

 index=index1 source = source1 host=host1 "got the message"

so if i dont find the message "got the message" for 6 hours i want to trigger an alert .

Labels (1)
Tags (1)
0 Karma

smurf
Communicator

Hi,

I was dealt with a similar scenario.

I would use a lookup to get a list of servers. I would also add the threshold to the lookup (host, threshold) to future-proof it.

Then you can append the list and do some dudup/stats magic; or start with inputlookup and join your search. 

smurf

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...