====== Triggers in QoE ======
{{indexmenu_n>5}}
Triggers are used to search for data in QoE Stor according to the specified parameters. After the trigger is fired, one of the following actions is possible:
* GUI notification
* HTTP action
* sending email
Required SSG options:
* [[en:dpi:dpi_options:opt_statistics]]
* [[en:dpi:dpi_options:opt_notify]]
Required additional modules:
* [[en:dpi:dpi_components:dpiui|]]
* [[en:dpi:dpi_components:qoestor|]]
===== Trigger configuration example: Finding the source of a Flood DDOS attack =====
=== General Information ===
{{ en:dpi:qoe:use_cases:ddos_general_en.jpg?nolink&600 |}}
Trigger name «Source of DDoS», days of week – all, check frequency – every hour, number of positives – once, time and date of start/end - not specified.
Every day, once an hour, a check will be carried out according to the conditions described below.
=== Queries ===
{{ dpi:qoe:use_cases:ddos_query.png?nolink&600 |}}
* Add a field
* Name: A
* Choose a table to be scanned: Raw full netflow -> Tables -> Attacks detection -> Top hosts IPs -> Maxi
* Set the period from: «now – 15minute», until : «now»
In this case, the traffic analysis for the selected page will be carried out for the period of the last 15 minutes.
=== Conditions ===
{{ dpi:qoe:use_cases:ddos_conditions.png?nolink&600 |}}
* Add "+" 2 fields
* Bind – AND
* Function – avg
* Serie in the 1 field – session timeout <= 20(ms)
* Serie in the 2 field – number of sessions >= 1500
We have set a condition — the trigger will fire when it detects both signs: sessions with lifetime equal or less than 20ms AND more than 1500 sessions from one IP-host.
=== Error handling ===
{{ dpi:qoe:use_cases:ddos_error.png?nolink&600 |}}
* In the field "If no data" — No data
* In the field "If execution error or timeout" — Keep last state
In this configuration — if there are no errors, no data will be saved; if any, information will be saved in the form of a table containing suspicious sessions.
=== Actions ===
== E-mail ==
{{ en:dpi:qoe:use_cases:ddos_action_email_en.jpg?nolink&600 |}}
* For automatic filling - click on the ">" icon (automatic filling of the form)
* In the field "Send to" — specify email address
With this setting, when the trigger is fired, all information about the event will be sent to the specified email: ID, trigger name, status, link to the report (saved state).
== Notification ==
{{ en:dpi:qoe:use_cases:ddos_action_notification_en.jpg?nolink&600 |}}
* For automatic filling - click on the ">" icon (automatic filling of the form)
* Choose the notification type — "Warning"
* With this setting, a notification will be created in the SSG
{{ dpi:qoe:use_cases:ddos_alerts.png?nolink&600 |}}
You can get a link to the report in the notification menu
{{ dpi:qoe:use_cases:ddos_report.png?nolink&400 |}}
Select notification \\
Select - "Details"
{{ dpi:qoe:use_cases:ddos_details.png?nolink&400 |}}
Follow the link to the report - it will open in a new tab.
== HTTP ==
{{ dpi:qoe:use_cases:ddos_http.png?nolink&600 |}}
* For automatic filling - click on the ">" icon (automatic filling of the form)
* Choose the method most suitable for your ticket system and enter the URL
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.
===== Trigger configuration example: Finding the target of a Flood DDOS attack =====
It differs from the previous example in setting 2 and 3 stages (Queries and Conditions).
=== Queries ===
{{ dpi:qoe:use_cases:ddos_target_query.png?nolink&600 |}}
In the "Report" field choose Raw full netflow -> Tables -> Attacks detection -> Top subscribers -> Maxi
=== Conditions ===
{{ dpi:qoe:use_cases:ddos_target_conditions.png?nolink&600 |}}
Serie — "Flow volume to subscribers", >= 10000
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.
===== BotNet Analysis =====
It differs from the previous example in setting 2 and 3 stages (Queries and Conditions).
=== Queries ===
{{ dpi:qoe:use_cases:botnet_query.png?nolink&600 |}}
* Choose Raw full netflow -> Tables -> Attacks detection -> Top application protocols -> Maxi for the "А" value
* Raw full network -> Tables -> Raw log -> Full raw log for the "B" value
=== Conditions ===
{{ dpi:qoe:use_cases:botnet_conditions.png?nolink&600 |}}
Most often, BotNet uses ports 6667 and 1080 — add each destination/source port by selecting query "B" with value "OR" and choose Flow Pcts/s equal or more than 2000.
With this configuration, if at least on one of the ports (6667/1080) the number of passing packets is more than 2000 per second, the trigger will fire.
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.
===== Subscriber's interest in competitor resources =====
=== General information ===
{{ en:dpi:qoe:use_cases:competitors_general_en.jpg?nolink&600 |}}
Trigger name «Subscriber's interest in competitor resources», days of week – all, check frequency – every hour, number of positives – once, time and date of start/end - not specified.
Every day, once an hour, a check will be carried out according to the conditions described below.
=== Queries ===
{{ dpi:qoe:use_cases:competitors_query.png?nolink&600 |}}
* Add "+" field
* Name А \\ Choose a table to be scanned: Raw clickstream -> Tables -> Raw clickstream
* Name B \\ Choose a table to be scanned: Raw full netflow -> Tables -> Attacks detection -> Top hosts IPs -> Maxi
* Set the period from: "now – 1 hour", until : "now"
In this case, the traffic analysis for the selected tables will be carried out every hour.
=== Conditions ===
{{ dpi:qoe:use_cases:competitors_conditions.png?nolink&600 |}}
* Add "+" 3 fields
* First field — choose table "А"; Bind – "OR"; Function – "avg"; Serie Host = *megafon.com (or any other competitor ISP)
* Second field — choose table "B"; Bind "AND"; Function – "avg"; Serie Flow volume from subscriber, Pct/s >= 800
We have set a condition — the trigger will fire at least 800 packets (not an accidental but meaningful visits) from a subscriber to a competitor's site.
=== Error handling ===
{{ dpi:qoe:use_cases:competitors_errors.png?nolink&600 |}}
* In the field "If no data" — No data
* In the field "If execution error or timeout" — Keep last state
In this configuration — if there are no errors, no data will be saved; if any, information will be saved in the form of a table containing suspicious sessions.
=== Actions ===
== E-mail ==
{{ en:dpi:qoe:use_cases:ddos_action_email_en.jpg?nolink&600 |}}
* For automatic filling - click on the ">" icon (automatic filling of the form)
* In the field "Send to" — specify email address
With this setting, when the trigger is fired, all information about the event will be sent to the specified email: ID, trigger name, status, link to the report (saved state).
== Notification ==
{{ en:dpi:qoe:use_cases:ddos_action_notification_en.jpg?nolink&600 |}}
* For automatic filling - click on the ">" icon (automatic filling of the form)
* Choose the notification type — "Warning"
* With this setting, a notification will be created in the SSG
{{ dpi:qoe:use_cases:competitors_alerts.png?nolink&600 |}}
You can get a link to the report in the notification menu
{{ dpi:qoe:use_cases:competitors_report.png?nolink&400 |}}
Select notification \\
Select — "Details"
{{ dpi:qoe:use_cases:competitors_details.png?nolink&400 |}}
Follow the link to the report — it will open in a new tab.
== HTTP ==
{{ dpi:qoe:use_cases:competitors_http.png?nolink&600 |}}
* For automatic filling — click on the ">" icon (automatic filling of the form)
* Choose the method most suitable for your ticket system and enter the URL
It is important to understand: the number of established sessions, the number of incoming packets, etc. are averaged. More precise configuration should be made taking into account the specifics of your network.