Alerting

How to find time delay between one log

muthukumar_covi
New Member

Hi, I'm new to Splunk, I have one log happens frequently, but sometimes log won't come for some short of time. I need to set alert when the log delay happens! how to do that?

That event having _time, host, source, and sourceType.

0 Karma

danan5
Path Finder

Hi,

This might help as a starting point. This looks for hosts that we have seen before and lists them if not seen for the last 24hours. It lisst host, sourcetype, index etc.

| tstats count as countAtToday latest(time) as lastTime where index!="*" by host sourcetype index
| eval age=now()-lastTime
| sort age d
| fieldformat lastTime=strftime(lastTime,"%Y/%m/%d %H:%M:%S") | eval age=round((age/60/60),1)
| search age>=24
| eval age=age."hour"
| dedup host

Adjust thresholds and save as an alert.

Regards,
David

0 Karma

muthukumar_covi
New Member

It's not working

0 Karma

to4kawa
Ultra Champion

Alert : CronExpressions@splunk>docs

It is recommended that you set the schedule, search periodically, and fire an alert if there is no log.
Please refer to the link

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...