Alerting

If the event count goes below 20 for multiple destination ip

NDabhi21
Explorer

I would like generate alert if no event for mentioned destination List for last 30 min.

I have tried below but is not work.

Index=_firewall sourcetype="f5:bigip:asm:syslog" dest_ip="10.10.10.20" earliest= -30m latest=now
| stats count by dest_ip,Service
| eval count=if (count <=20,0,0)

 

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @NDabhi21,

please try this:

index=_firewall sourcetype="f5:bigip:asm:syslog" dest_ip="10.10.10.20" earliest= -30m latest=now
| stats count by dest_ip Service
| where count<=20

then you have to configure your alert to trigger if there are results (results >0).

Ciao.

Giuseppe

NDabhi21
Explorer

For Multiple Destination, Is lookup table will work in same SPL Query 

|lookup IPLIST.csv ip AS dest_ip

 

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...