Splunk Search

Locating missing events

Path Finder

Hey all,

I've searched for an answer to this but cannot see one, so apologies if this has been answered before.

Some background: We have a number of FileMaker DBs and I am attempting setup some automation so confirm that the DBs are all open. To do this, a FileMaker Server-Side script runs every 15 mins and confirms that they are all open and output it's results to a table.

I am using the JDBC connector in the Splunk DB Connect app to index this table. This all working fine and I am able to search. However, if the FileMaker database is unreachable the events are not indexed and this is expected behaviour but I was wondering if there was a way to detect a lack of events for a specific time period to be able to report on them?

The events are VERY simple, a timestamp and one KVP. Example: "26/09/2013 09:15:00 AM" FilesOpen=13

Would "| overlap | collect" work in this instance? If so, is there any decent documentation on this method? The built-in documentation is limited at best.

Thanks in advance,


0 Karma

Splunk Employee
Splunk Employee
... | timechart span=15m count

And alert if the value is less than the expected number (or it's zero).

0 Karma

Splunk Employee
Splunk Employee

Or ... | timechart span=15m sum(FilesOpen)

0 Karma


You could just check your _internal index for the indexing rate for events going to that particular index.

If the rate drops below a threshold then send an alert.

index="_internal" sourcetype="splunkd" group="per_index_thruput" NOT (series="_*" OR series="/*" OR series="summary*") | rename series as index  | stats avg(kbps) by index 

Path Finder

Thanks for the response!

This would be good if I wanted to just alert. However, I would like to report on the missing events. ie count them.

0 Karma
Don’t Miss Global Splunk
User Groups Week!

Free LIVE events worldwide 2/8-2/12
Connect, learn, and collect rad prizes
and swag!