Alerting

field value occurence treshold

HansK
Path Finder

I want to create an alert with a certain treshold

I have this query:
host="abc0*" DN=* NOT DN="45643232*" NOT DN="53222455*"

Any time a distinct DN occurs more than 10 times per second I would like to be alerted.

How can I set this up?

0 Karma

rturk
Builder

Using the _internal index, here's the best approximation I can give you (my server name is "Voyager-2"):

index=_internal | timechart span=1s count by host | search Voyager-2>10

So in your case, something like this should do the trick:

host="abc0" DN= NOT DN="45643232" NOT DN="53222455" | timechart span=1s count by host

Then you create an alert based on your saved search that will trigger if the number of results is greater than 10.

Hope this helps 🙂

0 Karma

HansK
Path Finder

hmm, still alerting when there are 10 occurence of any DN, not when a single DN is >10

0 Karma

rturk
Builder

Ahh in that case, try this:

host="abc0" DN= NOT DN="45643232" NOT DN="53222455" | timechart span=1s dc(_raw) by DN

0 Karma

HansK
Path Finder

host="abc0" DN= NOT DN="45643232" NOT DN="53222455" | timechart span=1s count by DN

This comes closer than I was, but this will alert if the occurence of DN is higher than 10 per second.

DN can hold many values, I need it to alert when a distinct value occurs more than 10 times per second.

Thanks for helping though

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...