Splunk Enterprise Security

generating 5 individual notables events for single search but i need one notable event for all the search results

vikkysplunk
Path Finder

Hi all,

 

Using the below SPL i have created one new use case for multiple emails sent from external domain. For example if i get 5 results in search it is generating 5 individual notables events but i need one notable event for all the 5 results .. pls could you help me on these

index=msexchange sourcetype=MSExchange*:MessageTracking tag=email action=delivered sender_domain!=@x.x.x recipients!=@x.x.x | stats dc(recipient) as count by sender | search count >=4 | rename count as recipient_count | table sender recipient_count

Search Range 1hr

Cron schedule : */5 * * * *

Labels (2)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

Your count appears to be by sender not sender_domain, could that be why?

View solution in original post

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Your count appears to be by sender not sender_domain, could that be why?

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...