Alerting

Make a Alert across 2 Fields

coric
Engager

I'm trying to make an Alert trigger when the same source IP is more than 40 times, across more than 40 destination IP within 5 minutes. I'm not so sure how to accomplish this...

Labels (1)
Tags (2)
0 Karma
1 Solution

gcusello
SplunkTrust
SplunkTrust

Hi @coric,

let me understand: do you want to find when one source IP is connected with more than 40 different destination IPs in 5 minutes or what else?

If this is your need, you should try something like this:

your_search earliest=-5m latest=now
| stats dc(dest_IP) AS dc_dest_IP BY source_IP
| where dc_dest_IP>40

 Ciao.

Giuseppe

View solution in original post

gcusello
SplunkTrust
SplunkTrust

Hi @coric,

let me understand: do you want to find when one source IP is connected with more than 40 different destination IPs in 5 minutes or what else?

If this is your need, you should try something like this:

your_search earliest=-5m latest=now
| stats dc(dest_IP) AS dc_dest_IP BY source_IP
| where dc_dest_IP>40

 Ciao.

Giuseppe

coric
Engager

Perfect, that should work perfectly, il let you know!

0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...