<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help creating alert port 443 for 1 hour by action in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523274#M147589</link>
    <description>&lt;P&gt;the query if it works&lt;/P&gt;&lt;P&gt;I will keep in mind your suggestion about grouping&lt;/P&gt;&lt;P&gt;About the number of events I have been confused, just as indifferent to the number the help helps me&lt;/P&gt;&lt;P&gt;I don't know if I'm confused, I've seen queries where I put values ​​like "earliest = -30d" or "bucket _time span = 1s"&lt;/P&gt;</description>
    <pubDate>Tue, 06 Oct 2020 19:22:09 GMT</pubDate>
    <dc:creator>splunkcol</dc:creator>
    <dc:date>2020-10-06T19:22:09Z</dc:date>
    <item>
      <title>help creating alert port 443 for 1 hour by action</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523246#M147584</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that someone may have asked this, but the truth is I did not find anything similar.&lt;/P&gt;&lt;P&gt;I need to create a query for the events that exceed 500 attempts every 1 hour, when this happens an alert is generated.&lt;/P&gt;&lt;P&gt;index=* dest=200.22.22.22 dest_port=443 action=Accept |stats count by action src dest dest_port |where count &amp;gt; 120 |sort -count&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 17:36:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523246#M147584</guid>
      <dc:creator>splunkcol</dc:creator>
      <dc:date>2020-10-06T17:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: help creating alert port 443 for 1 hour by action</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523250#M147585</link>
      <description>&lt;P&gt;I presume the given query doesn't work or you wouldn't have posted here, but what is the problem with the query?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's not necessary to group the stats by action since there is only one action value in the results.&lt;/P&gt;&lt;P&gt;If you want to know about more than 500 attempts in an hour, why does the query look for 120?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 18:03:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523250#M147585</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-10-06T18:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: help creating alert port 443 for 1 hour by action</title>
      <link>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523274#M147589</link>
      <description>&lt;P&gt;the query if it works&lt;/P&gt;&lt;P&gt;I will keep in mind your suggestion about grouping&lt;/P&gt;&lt;P&gt;About the number of events I have been confused, just as indifferent to the number the help helps me&lt;/P&gt;&lt;P&gt;I don't know if I'm confused, I've seen queries where I put values ​​like "earliest = -30d" or "bucket _time span = 1s"&lt;/P&gt;</description>
      <pubDate>Tue, 06 Oct 2020 19:22:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/help-creating-alert-port-443-for-1-hour-by-action/m-p/523274#M147589</guid>
      <dc:creator>splunkcol</dc:creator>
      <dc:date>2020-10-06T19:22:09Z</dc:date>
    </item>
  </channel>
</rss>

