Splunk Search

Log sources not reporting in 24 hours

Ghanayem1974
Path Finder

anyone have an idea on how to write up a search that will provide details on which logsource stopped reporting for the last 24 hours?

Tags (1)
0 Karma

woodcock
Esteemed Legend

For hosts, like this (with very large timepicker value):

|metadata type=hosts
| eval age = now() - lastTime
| search age > 86400
0 Karma

pradeepkumarg
Influencer
|metadata type=sources | eval age = now() - lastTime | search age > 86400

Ghanayem1974
Path Finder

thank you but do you know if there is a way to separate out the devices that are not reporting? meaning, if its a windows server i want to the actual server that is not reporting. hope this makes sense.

0 Karma
Get Updates on the Splunk Community!

What the End of Support for Splunk Add-on Builder Means for You

Hello Splunk Community! We want to share an important update regarding the future of the Splunk Add-on Builder ...

Solve, Learn, Repeat: New Puzzle Channel Now Live

Welcome to the Splunk Puzzle PlaygroundIf you are anything like me, you love to solve problems, and what ...

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...