Splunk User Behavior Analytics

Assistance Needed: Pulling Data from Splunk Enterprise to Splunk UBA Using Time-Based Searches

kn450
Explorer

Hello Splunk Community,

I am a new Splunk UBA user and I am currently trying to pull data from Splunk Enterprise into Splunk UBA using time-based searches. I have followed the official UBA documentation and configuration guides, but I am still struggling to fully understand the process due to my limited experience with UBA.

Specifically, I am trying to:

  • Configure UBA to pull notable events and risk events from Splunk Enterprise Security.

  • Use time-based searches to collect data efficiently without missing events.

  • Understand how SPL queries and External Alarm categories work in this integration.

I would greatly appreciate any guidance, examples, or best practices you can share to help me successfully implement this integration.

Additionally, if you could suggest external resources, tutorials, or blogs that explain the process in a beginner-friendly way, that would be extremely helpful.

Thank you in advance for your support

Labels (1)
Tags (1)
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...