Alerting

If the event count goes below 20 for multiple destination ip

NDabhi21
Explorer

I would like generate alert if no event for mentioned destination List for last 30 min.

I have tried below but is not work.

Index=_firewall sourcetype="f5:bigip:asm:syslog" dest_ip="10.10.10.20" earliest= -30m latest=now
| stats count by dest_ip,Service
| eval count=if (count <=20,0,0)

 

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @NDabhi21,

please try this:

index=_firewall sourcetype="f5:bigip:asm:syslog" dest_ip="10.10.10.20" earliest= -30m latest=now
| stats count by dest_ip Service
| where count<=20

then you have to configure your alert to trigger if there are results (results >0).

Ciao.

Giuseppe

NDabhi21
Explorer

For Multiple Destination, Is lookup table will work in same SPL Query 

|lookup IPLIST.csv ip AS dest_ip

 

0 Karma
Get Updates on the Splunk Community!

Infographic provides the TL;DR for the 2023 Splunk Career Impact Report

We’ve been shouting it from the rooftops! The findings from the 2023 Splunk Career Impact Report showing that ...

Splunk Lantern | Getting Started with Edge Processor, Machine Learning Toolkit ...

Splunk Lantern is Splunk’s customer success center that provides advice from Splunk experts on valuable data ...

Enterprise Security Content Update (ESCU) | New Releases

In the last month, the Splunk Threat Research Team (STRT) has had 2 releases of new security content via the ...