Splunk Search

How can I create a search for any host sending excessive logs in compare to last hour

rahul_mckc_splu
Loves-to-Learn

Please help me to create a search, where I need to detect any anomaly of any host sending excessive logs with compare to the last hour.

For eg, if a host is sending x events this hour and next hour if it will send x+25% then we should get a trigger.

0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @rahul_mckc_splunk1
as @to4kawa hints, try something like this:

index=your_index earliest=-2@h latest=@h
| timechart count span=1h
| delta count AS diff
| reverse
| head 1
| eval perc=diff/count*100
| where perc>25

and run this search every hour.

Ciao.
Giuseppe

0 Karma

to4kawa
Ultra Champion

bin _time , stats by _time and eval is useful to create threshold
finally, use where to fire alert.

0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...