Splunk Enterprise Security

How to create ES correlation search that triggers only when action X is repeated by the same user 20 times in 5 minutes?

Sven1
Path Finder

Thanks in advance for any assistance you can please lend. 

Can someone please tell me how I can configure an Enterprise Security correlation search that triggers only when a specific action is repeated by the same user 20 times in 5 minutes?

Labels (2)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

Bin the events into 5-minute intervals and count the number of events for each user in each bucket.  Keep only the results where the count is at least 20.  Trigger the CS when the number of results is not zero.

<<your search for action X>>
| bin span=5m _time
| stats count by _time,user
| where count >= 20
---
If this reply helps you, Karma would be appreciated.

Sven1
Path Finder

richgalloway,

Thank you very much. 

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...