Monitoring Splunk

What is the best way to track a specific IP address for traffic flow and when traffic fails over to another location?

tpetro123
New Member

We are looking to track a specific IP for traffic to let us know when traffic stops flowing and diverts to another location. Need to know the best way of doing this.

Tags (1)
0 Karma
1 Solution

Sukisen1981
Champion

Hi,

I am assuming you have some event logging connected to the ip in question-something like userlogon ip=d.d.d.d
Now what I suggest is :
First get all events which captures traffic flow on this ip using something like the above event text
Next, your search | table _time,ip
next, use the previous function to calculate the _time of the previous event
next, calculate the time difference between the current row value of _time and previous _time (both of which will now be in the same row, so all rows barring the first event will have a _time and a previous _time in the same row)
next, calculate the time difference between _time and previous _time
next, establish a criteria , something like if difference>10 mins, traffic is stopped/diverted

We can help more if you can give some original query pertaining to the raw event and ip

View solution in original post

0 Karma

tpetro123
New Member

All we have in the search window now is just the IP address. Nothing fancy at all. Using trigger conditions trigger actions to try to produce what we are looking for and that is not really what we are looking for.

0 Karma

Sukisen1981
Champion

Hi,

You need to be a bit more specific, 'Using trigger conditions trigger actions to try to produce what we are looking for and that is not really what we are looking for.'
So what is the condition that identifies as an ip not being used and trafic being diverted to another location?
Is it something like
1st event ip d.d.d.d
2nd event ip d.d.d.d
3rd event ip x.x.x.x
and you want to capture the 3rd event / timestamp as the time when traffic got diverted?
You really need to provide an exact sample of how your events look like in Spunk at the moment

0 Karma

tpetro123
New Member

When we see no traffic to x.x.x.x for 15 minutes thenwe want a trigger to send a message

0 Karma

Sukisen1981
Champion

Hi,

I am assuming you have some event logging connected to the ip in question-something like userlogon ip=d.d.d.d
Now what I suggest is :
First get all events which captures traffic flow on this ip using something like the above event text
Next, your search | table _time,ip
next, use the previous function to calculate the _time of the previous event
next, calculate the time difference between the current row value of _time and previous _time (both of which will now be in the same row, so all rows barring the first event will have a _time and a previous _time in the same row)
next, calculate the time difference between _time and previous _time
next, establish a criteria , something like if difference>10 mins, traffic is stopped/diverted

We can help more if you can give some original query pertaining to the raw event and ip

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...