Splunk Enterprise Security

How to create ES correlation search that triggers only when action X is repeated by the same user 20 times in 5 minutes?

Sven1
Path Finder

Thanks in advance for any assistance you can please lend. 

Can someone please tell me how I can configure an Enterprise Security correlation search that triggers only when a specific action is repeated by the same user 20 times in 5 minutes?

Labels (2)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

Sven1
Path Finder

richgalloway,

Thank you very much. 

0 Karma
Get Updates on the Splunk Community!

Extending Observability Content to Splunk Cloud

Watch Now!   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to leverage ...

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...