Alerting

How to write an alert based on percentage of traffic from a single IP?

timtron
New Member

If the following search shows the top 5 source IP's

host="1.1.1.1" firewall OUT=vNic_1 action_abbr=ACCEPT_ | top limit=5 SRC

How can I alert if a single IP is greater than 25% of the events?

0 Karma

woodcock
Esteemed Legend

Try this (save search as an alert):

host="1.1.1.1" firewall OUT=vNic_1 action_abbr=ACCEPT_ | top limit=5 SRC | where percent > 25
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...