Alerting

How to configure an alert to trigger when two logs from two different sources are received?

karan_gopani
New Member

Hello Everyone,

I am new to Splunk and I want to configure an Alert which should trigger when two different logs are received from two different Sources.

For Ex. When
1. Log of Firewall comes with SADDR=8.8.8.8 with deviceAction Allowed
2. Log of WAF comes with SADDR=8.8.8.8 with deviceAction Blocked.

Here the Alert should trigger when both SADDR is allowed on firewall and Blocked on WAF.

Thanks

0 Karma
1 Solution

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2

View solution in original post

0 Karma

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2
0 Karma
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...