Getting Data In

Create an alert when multiple files are deleted

mishmeret
Observer

Hi,

I am trying to create an alert that triggers when more than 5 files are deleted in less than 3 minutes from the app we monitor. 

For some reason, the alert only works for single file deletion but does not work when I set it for. a number of events. any idea why? would love to get some help

0 Karma

isoutamo
SplunkTrust
SplunkTrust
Can you post your SPL and some sample events?
0 Karma

mishmeret
Observer

attached a screen shot, in the actions it send an email to out ticking system

0 Karma

isoutamo
SplunkTrust
SplunkTrust
How about actual SPL query and event samples?
0 Karma

mishmeret
Observer

thats the query I used: host="ip-of the host" "event_type..tag"=file_delete

works for single file deletion

0 Karma

mishmeret
Observer

Screen Shot 2021-11-16 at 16.42.30.png

0 Karma
Get Updates on the Splunk Community!

Building Reliable Asset and Identity Frameworks in Splunk ES

 Accurate asset and identity resolution is the backbone of security operations. Without it, alerts are ...

Cloud Monitoring Console - Unlocking Greater Visibility in SVC Usage Reporting

For Splunk Cloud customers, understanding and optimizing Splunk Virtual Compute (SVC) usage and resource ...

Automatic Discovery Part 3: Practical Use Cases

If you’ve enabled Automatic Discovery in your install of the Splunk Distribution of the OpenTelemetry ...