Monitoring Splunk

What is the best way to track a specific IP address for traffic flow and when traffic fails over to another location?

tpetro123
New Member

We are looking to track a specific IP for traffic to let us know when traffic stops flowing and diverts to another location. Need to know the best way of doing this.

Tags (1)
0 Karma
1 Solution

Sukisen1981
Champion

Hi,

I am assuming you have some event logging connected to the ip in question-something like userlogon ip=d.d.d.d
Now what I suggest is :
First get all events which captures traffic flow on this ip using something like the above event text
Next, your search | table _time,ip
next, use the previous function to calculate the _time of the previous event
next, calculate the time difference between the current row value of _time and previous _time (both of which will now be in the same row, so all rows barring the first event will have a _time and a previous _time in the same row)
next, calculate the time difference between _time and previous _time
next, establish a criteria , something like if difference>10 mins, traffic is stopped/diverted

We can help more if you can give some original query pertaining to the raw event and ip

View solution in original post

0 Karma

tpetro123
New Member

All we have in the search window now is just the IP address. Nothing fancy at all. Using trigger conditions trigger actions to try to produce what we are looking for and that is not really what we are looking for.

0 Karma

Sukisen1981
Champion

Hi,

You need to be a bit more specific, 'Using trigger conditions trigger actions to try to produce what we are looking for and that is not really what we are looking for.'
So what is the condition that identifies as an ip not being used and trafic being diverted to another location?
Is it something like
1st event ip d.d.d.d
2nd event ip d.d.d.d
3rd event ip x.x.x.x
and you want to capture the 3rd event / timestamp as the time when traffic got diverted?
You really need to provide an exact sample of how your events look like in Spunk at the moment

0 Karma

tpetro123
New Member

When we see no traffic to x.x.x.x for 15 minutes thenwe want a trigger to send a message

0 Karma

Sukisen1981
Champion

Hi,

I am assuming you have some event logging connected to the ip in question-something like userlogon ip=d.d.d.d
Now what I suggest is :
First get all events which captures traffic flow on this ip using something like the above event text
Next, your search | table _time,ip
next, use the previous function to calculate the _time of the previous event
next, calculate the time difference between the current row value of _time and previous _time (both of which will now be in the same row, so all rows barring the first event will have a _time and a previous _time in the same row)
next, calculate the time difference between _time and previous _time
next, establish a criteria , something like if difference>10 mins, traffic is stopped/diverted

We can help more if you can give some original query pertaining to the raw event and ip

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...