Splunk Enterprise Security

Throttling of Notable Use-Cases in Splunk For "OR" Condition

SplunkNewbie18
New Member

Hi,

Would like to find out if there is any option to throttle correlation searches rules for notables for > 1 field but on OR condition. (e.g. To throttle events if either "field1" OR "field2" has same events)? Understand that current option for "Fields to group by" is on an AND condition if the fields are > 1 (e.g. throttle events if "field1" AND "field2" is the same).

Thanks!

0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...