Hello, I am trying to create a trigger that will alert when an anomaly is detected in the incoming/outgoing network traffic of a given host. I want the trigger to be based on the new introductions in zabbix version 6.0, namely anomaly detection.
I am providing the structure of the trigger by which I am trying to detect the anomalies but I am not succeeding.
This is trigger structure for incoming traffic.
This is trigger structure for outgoing traffic.
My goal is to detect a change in traffic over a different period of days.
Could you help or give directions?
Тhanks in advance!
I am providing the structure of the trigger by which I am trying to detect the anomalies but I am not succeeding.
This is trigger structure for incoming traffic.
baselinewma(/MyTemplate/net.if.in[{#IFNAME}],24h:now/h,"w",4) < trendstl(/MyTemplate/net.if.in[{#IFNAME}],7d:now/h,3d,2h,3,"mad")
This is trigger structure for outgoing traffic.
baselinewma(/MyTemplate/net.if.out[{#IFNAME}],24h:now/h,"w",4) < trendstl(/MyTemplate/net.if.out[{#IFNAME}],7d:now/h,3d,2h,3,"mad")
My goal is to detect a change in traffic over a different period of days.
Could you help or give directions?
Тhanks in advance!