Splunk Search

How can I create a search for any host sending excessive logs in compare to last hour

rahul_mckc_splu
Loves-to-Learn

Please help me to create a search, where I need to detect any anomaly of any host sending excessive logs with compare to the last hour.

For eg, if a host is sending x events this hour and next hour if it will send x+25% then we should get a trigger.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @rahul_mckc_splunk1
as @to4kawa hints, try something like this:

index=your_index earliest=-2@h latest=@h
| timechart count span=1h
| delta count AS diff
| reverse
| head 1
| eval perc=diff/count*100
| where perc>25

and run this search every hour.

Ciao.
Giuseppe

0 Karma

to4kawa
Ultra Champion

bin _time , stats by _time and eval is useful to create threshold
finally, use where to fire alert.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...