Alerting

Splunk fire alert if there is same result 10 times in last 1 hour

SS1
Path Finder

Search:

index="test" "This is a error with IP Address *.*.*.*"

we have the above search query where the IP address keeps changing, so we want to fire an alert if there are 10 events for the same IP address in the last 1 hour.

Labels (4)
0 Karma

renjith_nair
Legend

Extract the IP address ,count by IP Address, run the search for last 60 mins and raise an alert if count > 10.

for .e.g

index="test" "This is an error with IP Address ..." earliest=-60m
|rex "IP Address\s+(?<IP>\d{1,3}.\d{1,3}.\d{1,3}.\d{1,3})"
|stats count by IP|where count >10

 

---
What goes around comes around. If it helps, hit it with Karma 🙂
0 Karma
Get Updates on the Splunk Community!

Observe and Secure All Apps with Splunk

  Join Us for Our Next Tech Talk: Observe and Secure All Apps with SplunkAs organizations continue to innovate ...

Splunk Decoded: Business Transactions vs Business IQ

It’s the morning of Black Friday, and your e-commerce site is handling 10x normal traffic. Orders are flowing, ...

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...