Splunk Enterprise Security

How to create ES correlation search that triggers only when action X is repeated by the same user 20 times in 5 minutes?

Sven1
Path Finder

Thanks in advance for any assistance you can please lend. 

Can someone please tell me how I can configure an Enterprise Security correlation search that triggers only when a specific action is repeated by the same user 20 times in 5 minutes?

Labels (2)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

Sven1
Path Finder

richgalloway,

Thank you very much. 

0 Karma
Get Updates on the Splunk Community!

Why You Can't Miss .conf25: Unleashing the Power of Agentic AI with Splunk & Cisco

The Defining Technology Movement of Our Lifetime The advent of agentic AI is arguably the defining technology ...

Deep Dive into Federated Analytics: Unlocking the Full Power of Your Security Data

In today’s complex digital landscape, security teams face increasing pressure to protect sprawling data across ...

Your summer travels continue with new course releases

Summer in the Northern hemisphere is in full swing, and is often a time to travel and explore. If your summer ...