Getting Data In

How do you use NetFlow to detect traffic spikes over a 10 min window by src_ip?

honey4sec
Explorer

Hi,

I am currently trying to create a search that looks at NetFlow data from all our hosts using a specified port 389

The value(traffic) is not fixed as some of our hosts have a normal hight chattiness using LDAP.

So my problem is that I haven't figured out how to create a search that's able to find the spikes in traffic.

What i do is trying to count packets, and say if the volume is doubled within the timewindow of 10 minutes, create an alert for that one host(src_ip)

Any tips or tricks?

I did try creating a search using moving average but the visual representation was all mumbled using timechart.

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Index This | What travels the world but is also stuck in place?

April 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Discover New Use Cases: Unlock Greater Value from Your Existing Splunk Data

Realizing the full potential of your Splunk investment requires more than just understanding current usage; it ...

Continue Your Journey: Join Session 2 of the Data Management and Federation Bootcamp ...

As data volumes continue to grow and environments become more distributed, managing and optimizing data ...