Alerting

How do I get a notification about changing the value of the field Device_ID?

MarinaSukhova
New Member

I have a log:
date time USER User_IP Device_ID
02.09.2018 18:01:34 user1 ip1 2C5DFVG78930R7JOAHP19S8USO
02.09.2018 18:02:34 user2 ip2 androidc78697991
02.09.2018 18:03:33 user3 ip3 QUBSCJ6AM94NPCNSPIL3H4N4HC
02.09.2018 18:04:33 user4 ip4 ITqHKJMNOqwM5q5AB1QCF1C9MOJMO8
02.09.2018 18:05:32 user5 ip5 4B88FFF650C950CE
02.09.2018 18:06:32 user6 ip6 9GB9021P5wsw2927D0A3CJ55KKD89S
02.09.2018 18:07:31 user7 ip7 SEC1EE05FBA56984
02.09.2018 18:08:30 user8 ip8 QUBSCJ6AMqsw94NPCNSPIL3H4N4HC
02.09.2018 18:09:30 user1 ip1 SV863D5OL539F94wFUI7E41O8JS

How do I get a notification about changing the value of the field Device_ID?

Such a search does not give the relevant values:

| bucket time span=10m 
| stats values(time) values(User_IP) values(Device_ID) dc(Device_ID) AS countDevice_ID by USER
| search countDevice_ID>1 
Tags (1)
0 Karma

Lazarix
Communicator

I think you may need to stop bucketing the time spans in 10 minute increments.
If you have to bucket, try 1m instead of 10m

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...