Alerting

Splunk fire alert if there is same result 10 times in last 1 hour

SS1
Path Finder

Search:

index="test" "This is a error with IP Address *.*.*.*"

we have the above search query where the IP address keeps changing, so we want to fire an alert if there are 10 events for the same IP address in the last 1 hour.

Labels (4)
0 Karma

renjith_nair
Legend

Extract the IP address ,count by IP Address, run the search for last 60 mins and raise an alert if count > 10.

for .e.g

index="test" "This is an error with IP Address ..." earliest=-60m
|rex "IP Address\s+(?<IP>\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})"
|stats count by IP|where count >10

 

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...