@@ -73,30 +73,30 @@ allow dynamic-group myloganalytics-detection-group to read compartments in tenan
73
73
74
74
Once we have the IAM pre-requisites in place, we can start by defining our custom metrics query.
75
75
76
- NAvigate to ``` Observability & Management->Logging analytics->Dashboards ``` and select Network Dashboard.
76
+ Navigate to ``` Observability & Management->Logging analytics->Dashboards ``` and select Network Dashboard.
77
77
78
78
![ network_dashboard] ( images/network_dashboard.png )
79
- Network Dashboard from Securty Fundamentals Dashboard
79
+ < small > Network Dashboard from Securty Fundamentals Dashboard</ small >
80
80
81
81
Expand Egress traffic widget and you will see the Log Explorer
82
82
83
83
![ drilldown] ( images/drilldown.png )
84
- Piture of log explorer
84
+ < small > Piture of log explorer</ small >
85
85
86
86
Run the modfied query:
87
87
```
88
88
'Log Source' = 'OCI VCN Flow Unified Schema Logs' | where 'Destination IP' = 'Public IP' | eval vol = 'Content Size Out' / 1024 | timestats span = 10minute sum(vol) as 'Volume (KB)
89
89
```
90
90
![ runquery] ( images/runquery.png )
91
- Picture of exection of modified query
91
+ < small > Picture of exection of modified query</ small >
92
92
93
93
![ savequery1] ( images/savequery1.png )
94
- Picture of save query as
94
+ < small > Picture of save query as</ small >
95
95
96
96
Pull the list of saved queries
97
97
98
98
![ savedsearches] ( images/savedsearches.png )
99
- Picture of modified query
99
+ < small > Picture of modified query</ small >
100
100
101
101
102
102
# Create detection rule
@@ -105,7 +105,7 @@ Having created the custom query, we now need to create the detection rule.
105
105
Navigate to ``` analytics->dashboard->saved query ``` , and pull up the saved query.
106
106
107
107
![ addmetric1] ( images/addmetric1.png )
108
- Picture of saved query screen
108
+ < small > Picture of saved query screen</ small >
109
109
110
110
Create the Detection rule. In the detection rule creation screen, select the folowing:
111
111
- "Scheduled Detection Rule" is the method for running the log analytic query
@@ -116,15 +116,15 @@ Create the Detection rule. In the detection rule creation screen, select the fol
116
116
- "Minimum interval" is 5 minutes, normally a good choice for security alarms.
117
117
118
118
![ addmetric2] ( images/addmetric2.png )
119
- Picture of first rule creation step
119
+ < small > Picture of first rule creation step</ small >
120
120
121
121
![ addmetric3] ( images/addmetric3.png )
122
- Picture of 2. step
122
+ < small > Picture of 2. step</ small >
123
123
124
124
When the detection rule is created verify the detection rule
125
125
126
126
![ detectionrule] ( images/detectionrule.png )
127
- Picture of rule validation
127
+ < small > Picture of rule validation</ small >
128
128
129
129
# Topic Creation
130
130
0 commit comments