Alerting

Make a Alert across 2 Fields

coric
Engager

I'm trying to make an Alert trigger when the same source IP is more than 40 times, across more than 40 destination IP within 5 minutes. I'm not so sure how to accomplish this...

Labels (1)
Tags (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @coric,

let me understand: do you want to find when one source IP is connected with more than 40 different destination IPs in 5 minutes or what else?

If this is your need, you should try something like this:

your_search earliest=-5m latest=now
| stats dc(dest_IP) AS dc_dest_IP BY source_IP
| where dc_dest_IP>40

 Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @coric,

let me understand: do you want to find when one source IP is connected with more than 40 different destination IPs in 5 minutes or what else?

If this is your need, you should try something like this:

your_search earliest=-5m latest=now
| stats dc(dest_IP) AS dc_dest_IP BY source_IP
| where dc_dest_IP>40

 Ciao.

Giuseppe

coric
Engager

Perfect, that should work perfectly, il let you know!

0 Karma
Get Updates on the Splunk Community!

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...

UCC Framework: Discover Developer Toolkit for Building Technology Add-ons

The Next-Gen Toolkit for Splunk Technology Add-on Development The Universal Configuration Console (UCC) ...

.conf25 Community Recap

Hello Splunkers, And just like that, .conf25 is in the books! What an incredible few days — full of learning, ...