Splunk Search

How to search for users that accessed the same system more than 5 times in 10 minutes and alert on this?

qiaojing
Path Finder

Hi,

I'm trying to search for users that access the SAME system more than 5 times in 10 minutes, in order to identify any abused usage of the system. I'm hoping to create an alert for such an event.

Currently, I've come up with this:

...| stats dc(System_ID) count by userID | where count>5

But I'm not sure if it's correct and how to search within the 10 minute time frame. Please help me out. I'm quite new to Splunk Enterprise.

Thank you very much! 🙂

0 Karma

sundareshr
Legend

Try this

.... | bin span=10m _time as time | stats dc(userID) as NoAttempts by time System_ID | where NoAttempts>=5

qiaojing
Path Finder

Hi this is my latest code where the threshold is the 95th percentile.

eventtype="centralizedlog"(hasAccess=Y) | bin span=20m _time | stats dc(System_ID) count by userID, _time| eventstats perc95(count) as adnorm | where count>adnorm | rename count as "Num of Log Events"| fields - adnorm - dc(System_ID)

Anyone knows how I can scheduled an alert that alerts me each time such event occurs? Thank you.

0 Karma

sundareshr
Legend

If your search is working, here's the documentation for creating an alert

http://docs.splunk.com/Documentation/Splunk/6.4.1/Alert/Definescheduledalerts

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...