<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Excessive Firewall Denies query in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175179#M50275</link>
    <description>&lt;P&gt;I assume this is some "rules facility" inside of Splunk ES app, right?&lt;/P&gt;</description>
    <pubDate>Fri, 08 May 2015 15:22:40 GMT</pubDate>
    <dc:creator>woodcock</dc:creator>
    <dc:date>2015-05-08T15:22:40Z</dc:date>
    <item>
      <title>Excessive Firewall Denies query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175178#M50274</link>
      <description>&lt;P&gt;I am trying to write a rule that fires if a single source IP creates 40 denied connections to at least 40 destinations in five minutes.&lt;/P&gt;

&lt;P&gt;| stats count dc(dest) as dest_count, values(dest) as Dest by action, src, signature_id, dest_port | search dest_count&amp;gt;40 AND count &amp;gt; 40  | eval searchtimespanminutes=5&lt;/P&gt;

&lt;P&gt;Could anyone tell me if using "searchtimespanminutes" is right and will this work? Or any suggestions would be much appreciated. &lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:46:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175178#M50274</guid>
      <dc:creator>Meena27</dc:creator>
      <dc:date>2020-09-28T19:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive Firewall Denies query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175179#M50275</link>
      <description>&lt;P&gt;I assume this is some "rules facility" inside of Splunk ES app, right?&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2015 15:22:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175179#M50275</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2015-05-08T15:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive Firewall Denies query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175180#M50276</link>
      <description>&lt;P&gt;&lt;CODE&gt;searchtimespanminutes&lt;/CODE&gt; is a depricated time modifier that goes after &lt;CODE&gt;earliest=&lt;/CODE&gt; at the start of your search (before the first pipe).&lt;BR /&gt;
You can read about them here. &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.2.3/SearchReference/SearchTimeModifiers"&gt;http://docs.splunk.com/Documentation/Splunk/6.2.3/SearchReference/SearchTimeModifiers&lt;/A&gt;&lt;BR /&gt;
So, first... you're not specifying a time modifier... and second, Splunk uses the time modifier to GET the data, and it isn't used as a filter afterwards... at least not like that. So right now, your eval just creates a field, with that name holding the value of 5 and it's not seen as having anything to do with the timespan...&lt;/P&gt;

&lt;P&gt;As far as an alert is concerned... the way you look at things is a bit different regarding the search:&lt;/P&gt;

&lt;P&gt;basically you're creating a search for the alert that will trigger under one of the following conditions:&lt;BR /&gt;
The two that apply here are "number of results" and/or custom condition which would be &lt;CODE&gt;search dest_count&amp;amp;gt;40 AND count &amp;amp;gt; 40&lt;/CODE&gt; or you can leave &lt;CODE&gt;search dest_count&amp;amp;gt;40&lt;/CODE&gt; in the search for context (when you look at it in a year) and have the condition be &lt;CODE&gt;count&amp;amp;gt;40&lt;/CODE&gt;.&lt;BR /&gt;
There is a slightly different set of conditions for a real-time search... &lt;BR /&gt;
So you're going to build a search that produces some number of results that the alert structure looks at and uses as a trigger.&lt;BR /&gt;
Make sense?&lt;/P&gt;

&lt;P&gt;If you're looking at historical data to find out if that condition has been met at all... in say, the past year... that's another story. &lt;/P&gt;

&lt;P&gt;I have something like this watching firewall data from my router and those of a couple of colleagues:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;index=syslog action="DROP" host="192.168.1.*"| timechart span=1h count | streamstats avg(count) as Count_Average stdev(count) as Standard_Deviation | eval Count_Average = round(Count_Average,0) | eval Standard_Deviation = round(Standard_Deviation,0) | where count&amp;gt;Count_Average+(2*Standard_Deviation) | rename count as Count&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;It runs over a span of 7 days and updates a dashboard... which basically shows "weird stuff that should be observed"&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2015 18:15:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175180#M50276</guid>
      <dc:creator>rsennett_splunk</dc:creator>
      <dc:date>2015-05-08T18:15:23Z</dc:date>
    </item>
    <item>
      <title>Re: Excessive Firewall Denies query</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175181#M50277</link>
      <description>&lt;P&gt;I did try that... didnt work...&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jun 2015 06:23:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Excessive-Firewall-Denies-query/m-p/175181#M50277</guid>
      <dc:creator>Meena27</dc:creator>
      <dc:date>2015-06-02T06:23:47Z</dc:date>
    </item>
  </channel>
</rss>

