Alerting

How to edit my search to alert me on heavy frequency change on Netflow?

nickbijmoer
Path Finder

Hello guys,

I want to generate an alert when my netflow count is something like 10% above the usual average count.
I got something like this but i don't know how to go further 😞

sourcetype="cisco:asa"  earliest=-7d@d latest=@d   | stats count by date_mday  | eventstats avg(count)

can someone help me?

Greetings,

Nick

0 Karma

somesoni2
Revered Legend

Give this a try (assuming you want to compare today's count with last 7 day's average count. If not adjust the relative_time value in eval period ).

sourcetype="cisco:asa" earliest=-7d@d latest=now | timechart span=1d count | eval period=if(_time>=relative_time(now(),"@d"),"today","last7days") | eval temp=1
| stats avg(count) as avgcount over temp by period | fields - temp
| where today>1.1*last7days
0 Karma

nickbijmoer
Path Finder

I get the error: Error in 'stats' command: The argument 'over' is invalid.

0 Karma
Get Updates on the Splunk Community!

New This Month in Splunk Observability Cloud - Metrics Usage Analytics, Enhanced K8s ...

The latest enhancements across the Splunk Observability portfolio deliver greater flexibility, better data and ...

Alerting Best Practices: How to Create Good Detectors

At their best, detectors and the alerts they trigger notify teams when applications aren’t performing as ...

Discover Powerful New Features in Splunk Cloud Platform: Enhanced Analytics, ...

Hey Splunky people! We are excited to share the latest updates in Splunk Cloud Platform 9.3.2408. In this ...