Alerting

Splunk alert if no events in source returned in X time

markgomez00
Explorer

Hi I was wondering if it is possible on splunk to search for a specific message on a source/log then alert if the last event received was more than 2 minute ago

my search string is:

  index=[index] host=[host] sourcetype=[sourcetype] "Keyword"

I'm searching for the word "Keyword" and i want to set an alert if the last result is more than 2 minutes ago

Thanks in advance

Tags (1)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

How about narrowing your search to the last 2 minutes and setting an alert if there are no results?

---
If this reply helps you, Karma would be appreciated.
0 Karma

markgomez00
Explorer

Hi @richgalloway thanks for your response,

I tried narrowing it to 2 minutes by adding 'earliest=-2m latest=now()' to my search, i have set it to run every 1 minute and if the result is 0 the alert should trigger, but sometimes the alert is triggering even if the results is > 0, is this a problem on timing?

note: the keyword is generated every 1 minute

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...