<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Paloalto VPN Down Alert in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/597003#M207813</link>
    <description>&lt;P&gt;My first reply would not return results if the VPN was not down for more than a minute - I believe that's the expected scenario.&amp;nbsp; Then the alert just has to be configured to trigger when the search returns results - meaning the the VPN has been down for at least one minute.&lt;/P&gt;&lt;P&gt;My answer also assumed events would be in reverse time order, which is the default for Splunk searches.&amp;nbsp; Since your screenshot shows that's not the case, here is an updated search.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=paloalto EventID=tunnel-status-down OR EventID=tunnel-status-up
| sort - _time
| dedup EventID Object
| where (EventID=tunnel-status-down AND _time &amp;lt; relative_time(now(),"-1m"))&lt;/LI-CODE&gt;</description>
    <pubDate>Mon, 09 May 2022 17:12:08 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2022-05-09T17:12:08Z</dc:date>
    <item>
      <title>How to create an alert for when the VPN goes down but only when the drop lasts more than 1 minute?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/596981#M207803</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I need to create an alert for when the VPN goes down but only when the drop lasts more than 1 minute.&lt;/P&gt;
&lt;P&gt;I would appreciate your help&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Right now I have the alert set to report any down events and then manually check which ones last longer than 1 minute.&lt;/P&gt;
&lt;P&gt;index=paloalto&amp;nbsp;&lt;SPAN&gt;|search EventID=tunnel-status-down OR EventID=tunnel-status-up&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 17:19:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/596981#M207803</guid>
      <dc:creator>splunkcol</dc:creator>
      <dc:date>2022-05-09T17:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VPN Down Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/596985#M207805</link>
      <description>&lt;P&gt;Look for where the last event is a status-down and it's been more than a minute since then.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=paloalto |search EventID=tunnel-status-down OR EventID=tunnel-status-up
| dedup EventID
| where (EventID=tunnel-status-down AND _time &amp;lt; relative_time(now(),"-1m"))&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 09 May 2022 15:05:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/596985#M207805</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-05-09T15:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VPN Down Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/596994#M207810</link>
      <description>&lt;P&gt;Hello, it did not bring me results.&lt;/P&gt;&lt;P&gt;This is the result when I only filter by the EventIDs, how can I calculate the time between the first down and the next up?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="splunkcol_0-1652111461289.png" style="width: 999px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/19525i770BBD9F60C68811/image-size/large?v=v2&amp;amp;px=999" role="button" title="splunkcol_0-1652111461289.png" alt="splunkcol_0-1652111461289.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 15:52:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/596994#M207810</guid>
      <dc:creator>splunkcol</dc:creator>
      <dc:date>2022-05-09T15:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto VPN Down Alert</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/597003#M207813</link>
      <description>&lt;P&gt;My first reply would not return results if the VPN was not down for more than a minute - I believe that's the expected scenario.&amp;nbsp; Then the alert just has to be configured to trigger when the search returns results - meaning the the VPN has been down for at least one minute.&lt;/P&gt;&lt;P&gt;My answer also assumed events would be in reverse time order, which is the default for Splunk searches.&amp;nbsp; Since your screenshot shows that's not the case, here is an updated search.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=paloalto EventID=tunnel-status-down OR EventID=tunnel-status-up
| sort - _time
| dedup EventID Object
| where (EventID=tunnel-status-down AND _time &amp;lt; relative_time(now(),"-1m"))&lt;/LI-CODE&gt;</description>
      <pubDate>Mon, 09 May 2022 17:12:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-create-an-alert-for-when-the-VPN-goes-down-but-only-when/m-p/597003#M207813</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2022-05-09T17:12:08Z</dc:date>
    </item>
  </channel>
</rss>

