<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Correlation search looking for at least x events within y seconds in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644557#M11539</link>
    <description>&lt;P&gt;Of course. Thank you.&lt;/P&gt;</description>
    <pubDate>Wed, 24 May 2023 21:06:38 GMT</pubDate>
    <dc:creator>Sven</dc:creator>
    <dc:date>2023-05-24T21:06:38Z</dc:date>
    <item>
      <title>Correlation search looking for at least x events within y seconds</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644555#M11537</link>
      <description>&lt;P&gt;Thanks in advance for your time and assistance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Splunk Enterprise Security correlation search intended to trigger when there are at least 20 events having the same values of FieldA and FieldB within 60 seconds.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Consistent with multiple resources within Splunk docs, I am using the below search.&amp;nbsp; The correlation search runs once every 30 minutes.&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(Main search) 
| bin _time span=60s 
| stats count by FieldA FieldB 
| where count &amp;gt; 19&lt;/LI-CODE&gt;&lt;P&gt;This should be straightforward, but the search has fired when there are 20 or more log entries with the same&amp;nbsp;FieldA and FieldB values during the entire 30 minutes since the last correlation search, but definitely not 20 instances within the defined bin window of 60s.&lt;/P&gt;&lt;P&gt;Is there some caveat of using the bin command that I am unaware of?&amp;nbsp; Is there a more reliable method to achieve the same objective?&lt;/P&gt;&lt;P&gt;_Thanks_&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 20:17:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644555#M11537</guid>
      <dc:creator>Sven</dc:creator>
      <dc:date>2023-05-24T20:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation search looking for at least x events within y seconds</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644556#M11538</link>
      <description>&lt;P&gt;Tell &lt;FONT face="courier new,courier"&gt;stats&lt;/FONT&gt; to group results by time as well as the other fields.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(Main search) 
| bin _time span=60s 
| stats count by _time FieldA FieldB 
| where count &amp;gt; 19&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 20:56:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644556#M11538</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-05-24T20:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Correlation search looking for at least x events within y seconds</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644557#M11539</link>
      <description>&lt;P&gt;Of course. Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 21:06:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Correlation-search-looking-for-at-least-x-events-within-y/m-p/644557#M11539</guid>
      <dc:creator>Sven</dc:creator>
      <dc:date>2023-05-24T21:06:38Z</dc:date>
    </item>
  </channel>
</rss>

