Splunk Enterprise

Hello All, I would like to ask how to write statements to find users who meet continuity requests

YL0J8K
Observer
How can Splunk query which IPs have been requested continuously for more than 3 days? And there are multiple values in the firewallSource field, how can we know which IPs have both WAF and ATE in requests during a certain time period_ LIMITED?
0 Karma

YL0J8K
Observer
index="starshield" source="http-requests" "firewallSource" IN ("WAF","RATE_LIMIT") "botscore"<10
| stats count values(client.ip) as ip,values(firewallSource) by client.ip,clientRequest.httpHost
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  &#x1f680; Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...