Hello.
I am working on creating an alert in Splunk for detecting when a firewall stops sending logs. We have all logs from firewalls forwarded to syslog in Splunk as sourcetype=pan:traffic . The problem is we have ha-pairs/ active and passive firewall and I don't see how to construct the query to check when BOTH firewalls (let's say active city-fw01 and passive city-fw02) don't send logs. We have more than 100 devices so I am using a lookup table with the list.
Any idea would be great, thanks.
Hi @te25
This might work, it assumes the lookup has a list of firewalls with a "host" field:
| inputlookup firewall_lookup.csv
| eval reported=0
| append
[ search index=yourIndex sourcetype=pan:traffic earliest=-15m
| stats count by host
| eval reported=1
| fields firewall reported ]
| stats max(reported) as reported by host
| rex field=host "(?<pair>[^0-9]+)"
| stats sum(reported) as reporting_count, values(host) as firewalls by pair
| where reporting_count=0
| table pair firewalls
🌟 Did this answer help you? If so, please consider:
Your feedback encourages the volunteers in this community to continue contributing
Hi
here is list of different articles how this can do in splunk.
There are a lot of options for finding hosts or sources that stop submitting events:
Some helpful posts:
Hi @te25
This might work, it assumes the lookup has a list of firewalls with a "host" field:
| inputlookup firewall_lookup.csv
| eval reported=0
| append
[ search index=yourIndex sourcetype=pan:traffic earliest=-15m
| stats count by host
| eval reported=1
| fields firewall reported ]
| stats max(reported) as reported by host
| rex field=host "(?<pair>[^0-9]+)"
| stats sum(reported) as reporting_count, values(host) as firewalls by pair
| where reporting_count=0
| table pair firewalls
🌟 Did this answer help you? If so, please consider:
Your feedback encourages the volunteers in this community to continue contributing
Have your lookup return the common name for the ha pair and detect when the pair has not sent logs (recently)