<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Detecting suspicious activity in search * See examples. in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Detecting-suspicious-activity-in-search-See-examples/m-p/154208#M185665</link>
    <description>&lt;P&gt;I need to be able to detect this pattern of events,  in a series of events where the TERMINAL number is increasing by 1 and eventually has a status of 'S', in other words, I need to be detect the event(s) that have a status of 'S' where the preceding 5 events were increasing by 1 and had a status of 'F'.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;

&lt;P&gt;_time                                                TERMINAL         DLDTYPE           STATUS&lt;/P&gt;

&lt;P&gt;2015-02-10T15:29:21.000-0500    1759512         U             F&lt;BR /&gt;
2015-02-10T15:29:31.000-0500    1759513         U             F&lt;BR /&gt;
2015-02-10T15:29:42.000-0500    1759514         U             F&lt;BR /&gt;
&lt;STRONG&gt;2015-02-10T15:30:17.000-0500  1759515         F             S&lt;BR /&gt;
2015-02-10T15:32:20.000-0500    1759516         F             S&lt;/STRONG&gt;&lt;BR /&gt;
2015-02-10T15:33:31.000-0500    1759517         U             F&lt;BR /&gt;
2015-02-10T15:34:42.000-0500    1759518             U             F&lt;/P&gt;</description>
    <pubDate>Wed, 18 Feb 2015 15:49:52 GMT</pubDate>
    <dc:creator>omgwut56k</dc:creator>
    <dc:date>2015-02-18T15:49:52Z</dc:date>
    <item>
      <title>Detecting suspicious activity in search * See examples.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Detecting-suspicious-activity-in-search-See-examples/m-p/154208#M185665</link>
      <description>&lt;P&gt;I need to be able to detect this pattern of events,  in a series of events where the TERMINAL number is increasing by 1 and eventually has a status of 'S', in other words, I need to be detect the event(s) that have a status of 'S' where the preceding 5 events were increasing by 1 and had a status of 'F'.&lt;/P&gt;

&lt;P&gt;Thank you&lt;/P&gt;

&lt;P&gt;_time                                                TERMINAL         DLDTYPE           STATUS&lt;/P&gt;

&lt;P&gt;2015-02-10T15:29:21.000-0500    1759512         U             F&lt;BR /&gt;
2015-02-10T15:29:31.000-0500    1759513         U             F&lt;BR /&gt;
2015-02-10T15:29:42.000-0500    1759514         U             F&lt;BR /&gt;
&lt;STRONG&gt;2015-02-10T15:30:17.000-0500  1759515         F             S&lt;BR /&gt;
2015-02-10T15:32:20.000-0500    1759516         F             S&lt;/STRONG&gt;&lt;BR /&gt;
2015-02-10T15:33:31.000-0500    1759517         U             F&lt;BR /&gt;
2015-02-10T15:34:42.000-0500    1759518             U             F&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 15:49:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Detecting-suspicious-activity-in-search-See-examples/m-p/154208#M185665</guid>
      <dc:creator>omgwut56k</dc:creator>
      <dc:date>2015-02-18T15:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting suspicious activity in search * See examples.</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Detecting-suspicious-activity-in-search-See-examples/m-p/154209#M185666</link>
      <description>&lt;P&gt;This seems to be working so far&lt;/P&gt;

&lt;P&gt;| delta TERMID AS delta  | table  _time TERMINAL delta STATUS MESSAGE | search delta="-1" STATUS=S&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 20:19:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Detecting-suspicious-activity-in-search-See-examples/m-p/154209#M185666</guid>
      <dc:creator>omgwut56k</dc:creator>
      <dc:date>2015-02-20T20:19:43Z</dc:date>
    </item>
  </channel>
</rss>

