Splunk Search

How to identify an unusual source sending a high volume of emails, excluding VCP public wifi from the 172 Host?

AL3Z
Builder

Hi,

I'm trying to build a search query for the Unexpected Host Sending a Large Amount of Email  in which i need to Exclude the  vcp public wifi anything come from 172 Host.

| tstats `summariesonly` count from datamodel=Network_Traffic where All_Traffic.app=*smtp* ` `unexpected_host_sending_a_large_amount_of_email_filter` NOT All_Traffic.dest=167.228.0.0/16 by All_Traffic.src All_Traffic.dest All_Traffic.src_category _time span=1h | rename All_Traffic.* as * | bin _time span=1d as day | eventstats dc(day) as day_count by src | 

How to edit the search accordingly.
Thanks.

Labels (2)
0 Karma

AL3Z
Builder

@caiosalonso 

How do we exclude src_ip!=172.30.* AND FromZone!="WIRELESS_VCP_ACTIVATION" from  datamodel Network_Traffic its not working as expected.

0 Karma

caiosalonso
Path Finder

Hi,

Just to confirm, do you need to add a filter to exclude events from a specifc Source IP Address in this query?

0 Karma

AL3Z
Builder

yes

 

0 Karma
Get Updates on the Splunk Community!

Index This | What’s a riddle wrapped in an enigma?

September 2025 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with this ...

BORE at .conf25

Boss Of Regular Expression (BORE) was an interactive session run again this year at .conf25 by the brilliant ...

OpenTelemetry for Legacy Apps? Yes, You Can!

This article is a follow-up to my previous article posted on the OpenTelemetry Blog, "Your Critical Legacy App ...