Splunk Search

More than 10 accounts disabled within five minutes.

weetabixsplunk
Explorer

Hi guys,

I'm working on a search that shows more that 10 accounts disabled within a five minute time frame. I feel like the dumbest girl on earth. I know my search works for the most part as the events tab shows the exact amount of events that occurred within that period of time, however, the statistics tab does not display a table:

index=wineventlog EventCode=4725
| bin span=5m _time
| stats count(user), values(user) by _time EventCode
| where count > 10

I also tried
index=wineventlog EventCode=4725
| bin span=5m _time
| table user, Time 
| search count > 10

Any help would be much appreciated.

Thanks

 

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=wineventlog EventCode=4725
| bin span=5m _time
| stats count, values(user) by _time EventCode
| where count > 10
0 Karma
Get Updates on the Splunk Community!

Index This | Why did the turkey cross the road?

November 2025 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Feel the Splunk Love: Real Stories from Real Customers

Hello Splunk Community,    What’s the best part of hearing how our customers use Splunk? Easy: the positive ...