Splunk Search

Search based on zero events

u_m1580
New Member

Hi there,

I would like to create a search to alert us based on an index not ingesting any event data by basing it off any field in our index

Labels (3)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @u_m1580 

I would look at using a tstats search as this will be more performant when there is data in the index.

Something simple such as:

|tstats count where index=<yourIndex>

Then you can alert where count=0, or add a | where count>0 and alert when there are no results.

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @u_m1580 ,

you could create an alert using a simple search

index=<your_index>

 that triggers if you have no events.

If you need to check a list of hosts, it's different.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...