Splunk Search

How to set an alert for a search if the stats count=0?

bfilippi
New Member

Hi

I am counting events and want to raise an alert if it is equal to zero

source="ES.csv"  index="mdata" sourcetype="csv" | stats count

I would like it to raise an alert if stats count = 0

how do I do this?

Thanks

Tags (3)
0 Karma
1 Solution

jeffland
SplunkTrust
SplunkTrust

It's easier than that. Do the search

source="ES.csv" index="mdata" sourcetype="csv"

and set the alerting options to alert you when it does not return results.

View solution in original post

jeffland
SplunkTrust
SplunkTrust

It's easier than that. Do the search

source="ES.csv" index="mdata" sourcetype="csv"

and set the alerting options to alert you when it does not return results.

bfilippi
New Member

thanks, I will try it. As you said, very straightforward!

0 Karma
Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...