<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why drilldown using all-time in Enterprise Security Incident Review in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711445#M29174</link>
    <description>&lt;P&gt;Its added some table like this&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="25%" height="24px"&gt;info_max_time&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;info_min_time&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;info_search_time&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;info_sid&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="25%" height="24px"&gt;+Infinity&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;0.000&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;17398492392.991&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;123123412132323&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it because min_time = 0 and max_time = +Infinity? And what would be the solution?&lt;/P&gt;</description>
    <pubDate>Thu, 13 Feb 2025 05:00:51 GMT</pubDate>
    <dc:creator>zksvc</dc:creator>
    <dc:date>2025-02-13T05:00:51Z</dc:date>
    <item>
      <title>Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711228#M29170</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Everyone, in default correlation search the name "Excessive Failed Logins" my drilldown cannot define $info_min_time$ and $info_max_time$ and it make when click drilldown searching in All-Time. If in every correlation search drilldown is matching the time when it trigger in correlation search, why this one searching in All-Time mode?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zksvc_0-1739249084284.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/34450i1C67165C06C4448A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="zksvc_0-1739249084284.png" alt="zksvc_0-1739249084284.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 04:44:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711228#M29170</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2025-02-11T04:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711231#M29171</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/269896"&gt;@zksvc&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try adding ` | addinfo` to the end of your search, this will add the info_* fields to the results and should let you use them within your drilldown.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 06:47:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711231#M29171</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-02-11T06:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711445#M29174</link>
      <description>&lt;P&gt;Its added some table like this&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="25%" height="24px"&gt;info_max_time&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;info_min_time&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;info_search_time&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;info_sid&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="25%" height="24px"&gt;+Infinity&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;0.000&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;17398492392.991&lt;/TD&gt;&lt;TD width="25%" height="24px"&gt;123123412132323&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it because min_time = 0 and max_time = +Infinity? And what would be the solution?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 05:00:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711445#M29174</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2025-02-13T05:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711470#M29180</link>
      <description>&lt;P&gt;hmm, Is your ES rule looking at All Time? If so, does it need to? This could chew up quite a bit of resource.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 08:44:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/711470#M29180</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-02-13T08:44:53Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/712043#M29196</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This rule already has a default from Splunk, with the earliest rt-65m@m and latest rt-5m@m timerange. But doesn't the drilldown only follow the time when the event is triggered?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 03:46:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/712043#M29196</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2025-02-20T03:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/741341#M29250</link>
      <description>&lt;P&gt;Did you find the reason for this?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Since upgrading to ES 8.0.2 all of our Correlation Searchers (Event-driven searches) now use 'All-time' instead of the&amp;nbsp;$info_min_time$ and&amp;nbsp;$info_max_time$ specified in the rule!&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2025 16:27:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/741341#M29250</guid>
      <dc:creator>StuartMacL</dc:creator>
      <dc:date>2025-03-10T16:27:08Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/748551#M29549</link>
      <description>&lt;P&gt;Removed&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2025 03:48:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/748551#M29549</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2025-06-24T03:48:07Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/748552#M29550</link>
      <description>&lt;P&gt;Just for troubleshooting purposes, can you create a brand new event finding (what used to be called correlation search before splunk ES 8? )&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What I like to do is just check to make sure if this is a problem with just this search or is systemic.&amp;nbsp; So I make my search something generic like&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;index=_internal | head 1 | table index, sourcetype, _time&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Again the above query is just a query that you know will have results each time it runs.&amp;nbsp; Feel free to make the search anything you want.&amp;nbsp; Then plug in your drilldown using the same values you applied in your question.&amp;nbsp; When the alert fires and you click its drilldown, does it go all time or does it use the time selection that you gave it.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Again this is just to identify if this is a problem for one correlation search or for all of your correlation searches.&amp;nbsp; This will allow us to get a better idea of what is and what is not working.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jun 2025 03:51:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/748552#M29550</guid>
      <dc:creator>LAME-Creations</dc:creator>
      <dc:date>2025-06-24T03:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/749025#M29567</link>
      <description>&lt;P&gt;Were you able to find a fix for this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd really hate to have to modify all Detections again after prepping for ES8.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 12:18:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/749025#M29567</guid>
      <dc:creator>Sodaro</dc:creator>
      <dc:date>2025-07-01T12:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/749294#M29569</link>
      <description>&lt;P&gt;Unfortunately, I haven't found a fix for this yet.&amp;nbsp;&lt;BR /&gt;I hope someone will share the solution so i can mark is as solution and help other people&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 03:22:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/749294#M29569</guid>
      <dc:creator>zksvc</dc:creator>
      <dc:date>2025-07-07T03:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Why drilldown using all-time in Enterprise Security Incident Review</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/750286#M29607</link>
      <description>&lt;P&gt;I haven't found a fix, but this is how I've been working around it:&lt;/P&gt;&lt;P&gt;In the detection search, make sure to call&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.2/SearchReference/Addinfo" target="_blank" rel="noopener"&gt;addinfo&lt;/A&gt;&amp;nbsp;.&lt;BR /&gt;Then, you can still use info_min/max_time to filter. You just have to do the filtering yourself.&lt;/P&gt;&lt;P&gt;Examples:&lt;/P&gt;&lt;P&gt;index=StuffYouWant starttimeu=$info_min_time$ endtimeu=$info_max_time$ | ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;| from datamodel:"Authentication"."Failed_Authentication" | search&amp;nbsp; _time&amp;gt;$info_min_time$ _time&amp;lt;$info_max_time$ ...&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jul 2025 22:12:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Why-drilldown-using-all-time-in-Enterprise-Security-Incident/m-p/750286#M29607</guid>
      <dc:creator>Collthulhu</dc:creator>
      <dc:date>2025-07-22T22:12:30Z</dc:date>
    </item>
  </channel>
</rss>

