Splunk Enterprise

Cisco ASA Deny Stats

mitcht
New Member

I want to build a query that pulls Cisco ASA events based on a particular syslog message ID which shows denied traffic. I dedup the information for events that have the same source ip, destination ip, destination port and action. 

It seems to work well however now I would like to have a count added for each time that unique combination is seen.

Query is:

index=cisco sourctype=cisco:asa message_id=XXXXXX |
dedup host, src_ip, dest_ip, dest_port, action |
table host, src_ip, dest_ip, dest_port, action |
sort host, src_ip, dest_ip, dest_port, action

That query gives me a table that appears to be dedup'ed however I would like to add a column that shows how many times each entry is seen.

0 Karma

richgalloway
SplunkTrust
SplunkTrust

To get a count, replace the dedup command with stats.  Since the stats command sorts it results, you don't need the separate sort command.

index=cisco sourctype=cisco:asa message_id=XXXXXX 
| stats count by host, src_ip, dest_ip, dest_port, action 
| table host, src_ip, dest_ip, dest_port, action count

 

---
If this reply helps you, Karma would be appreciated.
0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...