Alerting

How to configure an alert to trigger when two logs from two different sources are received?

karan_gopani
New Member

Hello Everyone,

I am new to Splunk and I want to configure an Alert which should trigger when two different logs are received from two different Sources.

For Ex. When
1. Log of Firewall comes with SADDR=8.8.8.8 with deviceAction Allowed
2. Log of WAF comes with SADDR=8.8.8.8 with deviceAction Blocked.

Here the Alert should trigger when both SADDR is allowed on firewall and Blocked on WAF.

Thanks

0 Karma
1 Solution

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2

View solution in original post

0 Karma

sundareshr
Legend

Try this. Set your alert if count > 0

(sourcetype=FirewallLogs deviceAction="Allowed") OR (sourcetype=WASLogs deviceAction="Blocked") | stats dc(sourcetype) as count by SADDR | where count=2
0 Karma
Get Updates on the Splunk Community!

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

ICYMI - Check out the latest releases of Splunk Edge Processor

Splunk is pleased to announce the latest enhancements to Splunk Edge Processor.  HEC Receiver authorization ...