VMware_VECO_EventLogs_CL
| where event == "EDGE_CONGESTED"
| where message contains "high number of packet drops"
| extend edgeSerialNumber = extract("edgeSerialNumber: (.+)$", 1, detail)
relevantTechniques:
- T1498
name: VMware SD-WAN Edge - Device Congestion Alert - Packet Drops
version: 1.0.0
customDetails:
edgeSerialNumber: edgeSerialNumber
requiredDataConnectors:
- connectorId: VMwareSDWAN
dataTypes:
- SDWAN
kind: Scheduled
eventGroupingSettings:
aggregationKind: SingleAlert
description: The VMware Edge Cloud Orchestrator reported an edge congestion event, where the Edge is dropping a large number of packets on one of its interfaces. This could indicate an ongoing Denial of Service attack against an appliance. Please make sure that Network Flood Protection is turned on.
queryPeriod: 1h
id: a88ead0a-f022-48d6-8f53-e5a164c4c72e
triggerThreshold: 0
queryFrequency: 1h
tactics:
- Impact
severity: Medium
suppressionEnabled: false
suppressionDuration: 5h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/VMware SD-WAN and SASE/Analytic Rules/vmw-sdwan-device-congestion.yaml
query: |-
VMware_VECO_EventLogs_CL
| where event == "EDGE_CONGESTED"
| where message contains "high number of packet drops"
| extend edgeSerialNumber = extract("edgeSerialNumber: (.+)$", 1, detail)
triggerOperator: gt
incidentConfiguration:
createIncident: true
groupingConfiguration:
groupByEntities: []
reopenClosedIncident: false
enabled: true
groupByCustomDetails: []
matchingMethod: AllEntities
lookbackDuration: 5h
groupByAlertDetails: []