Splunk Enterprise Security

How to get the difference in count of users and then trigger an alert

New Member

Hi Everyone,
I have a splunk search:
Search:

sourcetype = onelogin:event index = onelogin earliest=-12d AND event_type_id=8 | stats count by app_name 

The above search will give the counts of people logged-In in every application which is in one login but I need to prepare a search that will see the count of people logged in today and the counts of people logged in before one week, and if the counts of logged in people are less than 50% then it will trigger a alert . PLEASE GUIDE ME

-> I need a search that will take the counts of people logged in today and before one week and calculate the difference and then i can make a alert on the basis of that difference.

0 Karma
1 Solution

Contributor
index = onelogin sourcetype = onelogin:event earliest=@d latest=now
 | stats count as Today by app_name
 | appendcols [search index = onelogin sourcetype = onelogin:event earliest=-7d@d latest=@d
 | stats count as LastWeekSameDay by app_name]
 | eval perc=abs(round(((LastWeekSameDay-Today)/LastWeekSameDay)*100,2))

Let me know if you have any problems. Bye

View solution in original post

0 Karma

Contributor
index = onelogin sourcetype = onelogin:event earliest=@d latest=now
 | stats count as Today by app_name
 | appendcols [search index = onelogin sourcetype = onelogin:event earliest=-7d@d latest=@d
 | stats count as LastWeekSameDay by app_name]
 | eval perc=abs(round(((LastWeekSameDay-Today)/LastWeekSameDay)*100,2))

Let me know if you have any problems. Bye

View solution in original post

0 Karma

New Member

Thanks a lot 🙂

0 Karma

Motivator
0 Karma