Splunk Search

searching for non running programs in logs

idjagger
Engager

Hi all,

I'm trying to find which programs from a given list haven't raised an event in the eventlog in the last timeperiod to create an alert based on it.

For an individual alert I have 

index=eventlogs SourceName="my program" | stats count as COUNT_HEARTBEAT | where COUNT_HEARTBEAT=0

which works.

How can I supply a list of programs and list which of them have a COUNT_HEARTBEAT of 0 so that I can make a generic alert?

 

Thanks,

 

Kind regards,

 

Ian

Labels (3)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

See this blog entry for a good write-up on how to do that.

https://www.duanewaddle.com/proving-a-negative/

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

See this blog entry for a good write-up on how to do that.

https://www.duanewaddle.com/proving-a-negative/

---
If this reply helps you, Karma would be appreciated.

idjagger
Engager

Thank you, that is the perfect answer.

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You could store them in a csv file and append that to your events then count by program name.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

.conf25 Global Broadcast: Don’t Miss a Moment

Hello Splunkers, .conf25 is only a click away.  Not able to make it to .conf25 in person? No worries, you can ...

Observe and Secure All Apps with Splunk

 Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

What's New in Splunk Observability - August 2025

What's New We are excited to announce the latest enhancements to Splunk Observability Cloud as well as what is ...