Hello everyone,
I'm trying to schedule an alert looking like this: index=network host=device1 | stats count by sourceip | where count > 2 (last 7 days).
I will schedule it daily and I want it to search the last 7 days to see if an IP is found more than 2 times and return events like the below:
sourceip count
1 162.14.xxx.xxx 5
2 185.225.xxx.xxx 7
3 203.122.xxx.xxx 3
4 61.246.xxx.xxx 6
The problem is that the next day I don't want to see the same results if there is no new data from a new IP from the last 24h.
So I need to add a condition that will only allow the search to return results if a new returned result (where count > 2) is added to the results last 24h.
Do you have any suggestions?
Thank you in advance.
Thank you for your reply @ITWhisperer , it was very helpful. I modified two little things like below and now it is working perfectly:
index=network host=device1 earliest=-7d@d latest=@d
[ search index=network host=device1 earliest=-24h@h latest=@h
| fields sourceip]
| stats count by sourceip
| where count > 2
Best regards.
Try something like this
index=network host=device1 earliest=-7d@d latest=@d
[ index=network host=device1 earliest=-24h@h latest=@h
| dedup sourceip
| fields sourceip]
| stats count by sourceip
| where count > 2
Thank you for your reply @ITWhisperer , it was very helpful. I modified two little things like below and now it is working perfectly:
index=network host=device1 earliest=-7d@d latest=@d
[ search index=network host=device1 earliest=-24h@h latest=@h
| fields sourceip]
| stats count by sourceip
| where count > 2
Best regards.