Splunk Enterprise Security

Query for data sources not reporting an event in a specific time period.

staparia
Explorer

Hi,

I would request a query where if a log source has stopped sending an event to splunk for a specific time period, it should alert me.

Example index=proxy sourcetype=test_5 not giving any result for last 15 mins.

0 Karma

paramagurukarth
Builder
index=*| stats count as event_count by sourcetype |append[|metadata type=sourcetypes index=* OR index=_*| eval event_count=coalesce(event_count, 0) | table sourcetype,event_count] | where event_count = 0
0 Karma

renjith_nair
Legend

@staparia ,

index=proxy sourcetype=test_5 earliest=-15m|stats count|where count > 0

Set an alert for 'No of events is less than 0'

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...