Splunk Search

Search based on zero events

u_m1580
New Member

Hi there,

I would like to create a search to alert us based on an index not ingesting any event data by basing it off any field in our index

Labels (3)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @u_m1580 

I would look at using a tstats search as this will be more performant when there is data in the index.

Something simple such as:

|tstats count where index=<yourIndex>

Then you can alert where count=0, or add a | where count>0 and alert when there are no results.

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @u_m1580 ,

you could create an alert using a simple search

index=<your_index>

 that triggers if you have no events.

If you need to check a list of hosts, it's different.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

October Community Champions: A Shoutout to Our Contributors!

As October comes to a close, we want to take a moment to celebrate the people who make the Splunk Community ...

Community Content Calendar, November Edition

Welcome to the November edition of our Community Spotlight! Each month, we dive into the Splunk Community to ...

Stay Connected: Your Guide to November Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...