Alerting

How to configure an alert to trigger when two logs from two different sources are received?

karan_gopani
New Member

Hello Everyone,

I am new to Splunk and I want to configure an Alert which should trigger when two different logs are received from two different Sources.

For Ex. When
1. Log of Firewall comes with SADDR=8.8.8.8 with deviceAction Allowed
2. Log of WAF comes with SADDR=8.8.8.8 with deviceAction Blocked.

Here the Alert should trigger when both SADDR is allowed on firewall and Blocked on WAF.

Thanks

0 Karma
1 Solution

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2

View solution in original post

0 Karma

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2
0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...