Splunk Search

More than 10 accounts disabled within five minutes.

weetabixsplunk
Explorer

Hi guys,

I'm working on a search that shows more that 10 accounts disabled within a five minute time frame. I feel like the dumbest girl on earth. I know my search works for the most part as the events tab shows the exact amount of events that occurred within that period of time, however, the statistics tab does not display a table:

index=wineventlog EventCode=4725
| bin span=5m _time
| stats count(user), values(user) by _time EventCode
| where count > 10

I also tried
index=wineventlog EventCode=4725
| bin span=5m _time
| table user, Time 
| search count > 10

Any help would be much appreciated.

Thanks

 

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=wineventlog EventCode=4725
| bin span=5m _time
| stats count, values(user) by _time EventCode
| where count > 10
0 Karma
Get Updates on the Splunk Community!

Splunk Enterprise Security 8.0.2 Availability: On cloud and On-premise!

A few months ago, we released Splunk Enterprise Security 8.0 for our cloud customers. Today, we are excited to ...

Logs to Metrics

Logs and Metrics Logs are generally unstructured text or structured events emitted by applications and written ...

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...