Deployment Architecture

Why drilldown using all-time in Enterprise Security Incident Review

zksvc
Contributor

Hi Everyone, in default correlation search the name "Excessive Failed Logins" my drilldown cannot define $info_min_time$ and $info_max_time$ and it make when click drilldown searching in All-Time. If in every correlation search drilldown is matching the time when it trigger in correlation search, why this one searching in All-Time mode?

zksvc_0-1739249084284.png

 

 

 

 

Labels (1)

Collthulhu
Engager

I haven't found a fix, but this is how I've been working around it:

In the detection search, make sure to call addinfo .
Then, you can still use info_min/max_time to filter. You just have to do the filtering yourself.

Examples:

index=StuffYouWant starttimeu=$info_min_time$ endtimeu=$info_max_time$ | ...

 

| from datamodel:"Authentication"."Failed_Authentication" | search  _time>$info_min_time$ _time<$info_max_time$ ...

Sodaro
Engager

Were you able to find a fix for this?

 

I'd really hate to have to modify all Detections again after prepping for ES8.

0 Karma

zksvc
Contributor

Unfortunately, I haven't found a fix for this yet. 
I hope someone will share the solution so i can mark is as solution and help other people

0 Karma

LAME-Creations
SplunkTrust
SplunkTrust

Just for troubleshooting purposes, can you create a brand new event finding (what used to be called correlation search before splunk ES 8? ) 

What I like to do is just check to make sure if this is a problem with just this search or is systemic.  So I make my search something generic like 

index=_internal | head 1 | table index, sourcetype, _time 

Again the above query is just a query that you know will have results each time it runs.  Feel free to make the search anything you want.  Then plug in your drilldown using the same values you applied in your question.  When the alert fires and you click its drilldown, does it go all time or does it use the time selection that you gave it.  

Again this is just to identify if this is a problem for one correlation search or for all of your correlation searches.  This will allow us to get a better idea of what is and what is not working.  

0 Karma

zksvc
Contributor

Removed

0 Karma

StuartMacL
Path Finder

Did you find the reason for this? 

Since upgrading to ES 8.0.2 all of our Correlation Searchers (Event-driven searches) now use 'All-time' instead of the $info_min_time$ and $info_max_time$ specified in the rule!

livehybrid
SplunkTrust
SplunkTrust

Hi @zksvc 

Try adding ` | addinfo` to the end of your search, this will add the info_* fields to the results and should let you use them within your drilldown.

 

Please let me know how you get on and consider accepting this answer or adding karma this answer if it has helped.
Regards

Will

0 Karma

zksvc
Contributor

Its added some table like this

info_max_timeinfo_min_timeinfo_search_timeinfo_sid
+Infinity0.00017398492392.991123123412132323

 

Is it because min_time = 0 and max_time = +Infinity? And what would be the solution?

0 Karma

livehybrid
SplunkTrust
SplunkTrust

hmm, Is your ES rule looking at All Time? If so, does it need to? This could chew up quite a bit of resource.

0 Karma

zksvc
Contributor

This rule already has a default from Splunk, with the earliest rt-65m@m and latest rt-5m@m timerange. But doesn't the drilldown only follow the time when the event is triggered? 

Get Updates on the Splunk Community!

🌟 From Audit Chaos to Clarity: Welcoming Audit Trail v2

&#x1f5e3; You Spoke, We Listened Audit Trail v2 wasn’t written in isolation—it was shaped by your voices. In ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

 Prepare to elevate your security operations with the powerful upgrade to Splunk Enterprise Security 8.x! This ...

Get Early Access to AI Playbook Authoring: Apply for the Alpha Private Preview ...

Passionate about security automation? Apply now to our AI Playbook Authoring Alpha private preview ...