Splunk Search

Search based on zero events

u_m1580
New Member

Hi there,

I would like to create a search to alert us based on an index not ingesting any event data by basing it off any field in our index

Labels (3)
0 Karma

livehybrid
SplunkTrust
SplunkTrust

Hi @u_m1580 

I would look at using a tstats search as this will be more performant when there is data in the index.

Something simple such as:

|tstats count where index=<yourIndex>

Then you can alert where count=0, or add a | where count>0 and alert when there are no results.

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @u_m1580 ,

you could create an alert using a simple search

index=<your_index>

 that triggers if you have no events.

If you need to check a list of hosts, it's different.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

AI for AppInspect

We’re excited to announce two new updates to AppInspect designed to save you time and make the app approval ...

App Platform's 2025 Year in Review: A Year of Innovation, Growth, and Community

As we step into 2026, it’s the perfect moment to reflect on what an extraordinary year 2025 was for the Splunk ...

Operationalizing Entity Risk Score with Enterprise Security 8.3+

Overview Enterprise Security 8.3 introduces a powerful new feature called “Entity Risk Scoring” (ERS) for ...