Alerting

Creating a search to check the if any user has sent more than 100 emails per hour

singriajay
Explorer

Hi Team,

I have used the below search to find the top senders

eventtype=cisco-esa | transaction keepevicted=true icid mid | search host="*" sender="*" recipient="*" dest_interface="*" policy_direction="*" threat_reason="*" | stats count by sender,recipient,threat_reason,host,sender_reputation,policy_direction,_time | top sender 

But I need to create an alert if any sender has sent emails more than 25 per hour

Tags (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

If you want an alert when something happens, then you need to search for that something.

eventtype=cisco-esa earliest=-60m 
| transaction keepevicted=true icid mid 
| search host="*" sender="*" recipient="*" dest_interface="*" policy_direction="*" threat_reason="*" 
| stats count, values(recipient) as recipients, values(threat_reason) as threat_reasons, values(host) as hosts, values(sender_reputation) as sender_reputation, values(policy_direction) as policy_direction, values(_time) as _time by sender
| where count>100
---
If this reply helps you, Karma would be appreciated.
0 Karma

singriajay
Explorer

Hi richgalloway,

I wanted to get the count of senders to multiple users; in the above query we get only the count of senders per recipient.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The above answer displays "any sender has sent emails more than 25 per hour". To get sender/recipient pairs, try this:

eventtype=cisco-esa earliest=-60m 
 | transaction keepevicted=true icid mid 
 | search host="*" sender="*" recipient="*" dest_interface="*" policy_direction="*" threat_reason="*" 
 | stats count, values(threat_reason) as threat_reasons, values(host) as hosts, values(sender_reputation) as sender_reputation, values(policy_direction) as policy_direction, values(_time) as _time by sender,recipient
 | where count>100
---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...