Splunk Search

How to identify an unusual source sending a high volume of emails, excluding VCP public wifi from the 172 Host?

AL3Z
Builder

Hi,

I'm trying to build a search query for the Unexpected Host Sending a Large Amount of Email  in which i need to Exclude the  vcp public wifi anything come from 172 Host.

| tstats `summariesonly` count from datamodel=Network_Traffic where All_Traffic.app=*smtp* ` `unexpected_host_sending_a_large_amount_of_email_filter` NOT All_Traffic.dest=167.228.0.0/16 by All_Traffic.src All_Traffic.dest All_Traffic.src_category _time span=1h | rename All_Traffic.* as * | bin _time span=1d as day | eventstats dc(day) as day_count by src | 

How to edit the search accordingly.
Thanks.

Labels (2)
0 Karma

AL3Z
Builder

@caiosalonso 

How do we exclude src_ip!=172.30.* AND FromZone!="WIRELESS_VCP_ACTIVATION" from  datamodel Network_Traffic its not working as expected.

0 Karma

caiosalonso
Path Finder

Hi,

Just to confirm, do you need to add a filter to exclude events from a specifc Source IP Address in this query?

0 Karma

AL3Z
Builder

yes

 

0 Karma
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...