Splunk Enterprise Security

Using the _time field for throttling within the correlation search.

AL3Z
Builder

Hi all,

In my AD computer account deletion correlation search, I use _time and subjectusername in throttling fields for grouping. Is adding _time to throttling the correct approach? Please correct me if I'm wrong.
query 
index=win sourcetype=XmlWinEventLog EventCode=4743
| bin _time span=5m
| stats values(EventCode) as EventCode, values(signature) as EventDescription, values(TargetUserName) as deleted_computer,  dc(TargetUserName) as computeruser_count by _time SubjectUserName
| where computeruser_count > 20
Time Range set to 
Earliest Time 20m@m
latest now
cron schedule */15 * * * *

Scheduling  set to Continuous

Throttling 
window duration 12 hours

Fields to group by SubjectUserName , _time

Thanks in Advance..

 

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Throttling works by checking to see if the specified field changed value within the throttle period.  Since _time is always changing it is ineffective as a throttle.

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

@richgalloway ,

I need to change the query or its fine to drop the _time from the Throttling group by field name?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I would drop _time as a throttling field.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Splunk Enterprise Security(ES) 7.3 is approaching the end of support. Get ready for ...

Hi friends!    At Splunk, your product success is our top priority. With Enterprise Security (ES), we're here ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...