Getting Data In

Help needed with Search to correlate Windows Event Logs

rishiaggarwal
Explorer

Hi All,

I have a requirement to write a Splunk query that will alert if windows event logs capture three EventCodes (independent events) within 30 secs

PseudoQuery :
"EventCode= X, Y, Z| bucket span=30s _time | fields _time hostname EventCode"

Any leads, please?

0 Karma
1 Solution

HiroshiSatoh
Champion

Try this!

index=(your inddex) (EventCode= 4624 OR EventCode= 4672 EventCode= 4676)
| bucket span=30s _time | stats dc(EventCode) as count by _time,hostname|where count=3

View solution in original post

0 Karma

HiroshiSatoh
Champion

Try this!

index=(your inddex) (EventCode= 4624 OR EventCode= 4672 EventCode= 4676)
| bucket span=30s _time | stats dc(EventCode) as count by _time,hostname|where count=3
0 Karma
Get Updates on the Splunk Community!

What's New in Splunk Cloud Platform 9.2.2403?

Hi Splunky people! We are excited to share the newest updates in Splunk Cloud Platform 9.2.2403! Analysts can ...

Stay Connected: Your Guide to July and August Tech Talks, Office Hours, and Webinars!

Dive into our sizzling summer lineup for July and August Community Office Hours and Tech Talks. Scroll down to ...

Edge Processor Scaling, Energy & Manufacturing Use Cases, and More New Articles on ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...