Splunk Enterprise Security

How to create ES correlation search that triggers only when action X is repeated by the same user 20 times in 5 minutes?

Sven1
Path Finder

Thanks in advance for any assistance you can please lend. 

Can someone please tell me how I can configure an Enterprise Security correlation search that triggers only when a specific action is repeated by the same user 20 times in 5 minutes?

Labels (2)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

Sven1
Path Finder

richgalloway,

Thank you very much. 

0 Karma
Get Updates on the Splunk Community!

Say goodbye to manually analyzing phishing and malware threats with Splunk Attack ...

In today’s evolving threat landscape, we understand you’re constantly bombarded with phishing and malware ...

AppDynamics is now part of Splunk Ideas

Hello Splunkers, We have exciting news for you! AppDynamics has been added to the Splunk Ideas Portal. Which ...

Advanced Splunk Data Management Strategies

Join us on Wednesday, May 14, 2025, at 11 AM PDT / 2 PM EDT for an exclusive Tech Talk that delves into ...