Alerting

How to configure an alert to trigger when two logs from two different sources are received?

karan_gopani
New Member

Hello Everyone,

I am new to Splunk and I want to configure an Alert which should trigger when two different logs are received from two different Sources.

For Ex. When
1. Log of Firewall comes with SADDR=8.8.8.8 with deviceAction Allowed
2. Log of WAF comes with SADDR=8.8.8.8 with deviceAction Blocked.

Here the Alert should trigger when both SADDR is allowed on firewall and Blocked on WAF.

Thanks

0 Karma
1 Solution

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2

View solution in original post

0 Karma

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...

Auto-Injector for Everything Else: Making OpenTelemetry Truly Universal

You might have seen Splunk’s recent announcement about donating the OpenTelemetry Injector to the ...