Alerting

If the event count goes below 20 for multiple destination ip

NDabhi21
Explorer

I would like generate alert if no event for mentioned destination List for last 30 min.

I have tried below but is not work.

Index=_firewall sourcetype="f5:bigip:asm:syslog" dest_ip="10.10.10.20" earliest= -30m latest=now
| stats count by dest_ip,Service
| eval count=if (count <=20,0,0)

 

Labels (1)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @NDabhi21,

please try this:

index=_firewall sourcetype="f5:bigip:asm:syslog" dest_ip="10.10.10.20" earliest= -30m latest=now
| stats count by dest_ip Service
| where count<=20

then you have to configure your alert to trigger if there are results (results >0).

Ciao.

Giuseppe

NDabhi21
Explorer

For Multiple Destination, Is lookup table will work in same SPL Query 

|lookup IPLIST.csv ip AS dest_ip

 

0 Karma
Get Updates on the Splunk Community!

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...

Splunk App Developers | .conf25 Recap & What’s Next

If you stopped by the Builder Bar at .conf25 this year, thank you! The retro tech beer garden vibes were ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...