This is an old revision of the document!
Triggers in QoE
Triggers are used to search for data in QoE Stor according to the specified parameters. After the trigger is fired, one of the following actions is possible:
- GUI notification
- HTTP action
- sending email
Required SSG options:
Required additional modules:
Trigger configuration example: Finding the source of a Flood DDOS attack
General Information
Trigger name «Source of DDoS», days of week – all, check frequency – every hour, number of positives – once, time and date of start/end - not specified.
Queries
- Add a field
- Name: A
- Choose a table to be scanned: Raw full netflow → Tables → Attacks detection → Top hosts IPs → Maxi
- Set the period from: «now – 15minute», until : «now»
Conditions
- Add "+" 2 fields
- Bind – AND
- Function – avg
- Serie in the 1 field – session timeout <= 20(ms)
- Serie in the 2 field – number of sessions >= 1500
Error handling
- In the field "If no data" — No data
- In the field "If execution error or timeout" — Keep last state
Actions
- For automatic filling - click on the "</>" icon (automatic filling of the form)
- In the field "Send to" — specify email address
Notification
- For automatic filling - click on the "</>" icon (automatic filling of the form)
- Choose the notification type — "Warning"
- With this setting, a notification will be created in the SSG
You can get a link to the report in the notification menu
Select notification
Select - "Details"
Follow the link to the report - it will open in a new tab.
HTTP
- For automatic filling - click on the "</>" icon (automatic filling of the form)
- Choose the method most suitable for your ticket system and enter the URL
Trigger configuration example: Finding the target of a Flood DDOS attack
It differs from the previous example in setting 2 and 3 stages (Queries and Conditions).
Queries
In the "Report" field choose Raw full netflow → Tables → Attacks detection → Top subscribers → Maxi
Conditions
Serie — "Flow volume to subscribers", >= 10000
BotNet Analysis
It differs from the previous example in setting 2 and 3 stages (Queries and Conditions).
Queries
- Choose Raw full netflow → Tables → Attacks detection → Top application protocols → Maxi for the "А" value
- Raw full network → Tables → Raw log → Full raw log for the "B" value
Conditions
Most often, BotNet uses ports 6667 and 1080 — add each destination/source port by selecting query "B" with value "OR" and choose Flow Pcts/s equal or more than 2000.
Subscriber's interest in competitor resources
General information
Trigger name «Subscriber's interest in competitor resources», days of week – all, check frequency – every hour, number of positives – once, time and date of start/end - not specified.
Queries
- Add "+" field
- Name А
Choose a table to be scanned: Raw clickstream → Tables → Raw clickstream - Name B
Choose a table to be scanned: Raw full netflow → Tables → Attacks detection → Top hosts IPs → Maxi - Set the period from: "now – 1 hour", until : "now"
Conditions
- Add "+" 3 fields
- First field — choose table "А"; Bind – "OR"; Function – "avg"; Serie Host = *megafon.com (or any other competitor ISP)
- Second field — choose table "B"; Bind "AND"; Function – "avg"; Serie Flow volume from subscriber, Pct/s >= 800
Error handling
- In the field "If no data" — No data
- In the field "If execution error or timeout" — Keep last state
Actions
- For automatic filling - click on the "</>" icon (automatic filling of the form)
- In the field "Send to" — specify email address
Notification
- For automatic filling - click on the "</>" icon (automatic filling of the form)
- Choose the notification type — "Warning"
- With this setting, a notification will be created in the SSG
You can get a link to the report in the notification menu
Select notification
Select — "Details"
Follow the link to the report — it will open in a new tab.
HTTP
- For automatic filling — click on the "</>" icon (automatic filling of the form)
- Choose the method most suitable for your ticket system and enter the URL