Splunk Search

More than 10 accounts disabled within five minutes.

weetabixsplunk
Explorer

Hi guys,

I'm working on a search that shows more that 10 accounts disabled within a five minute time frame. I feel like the dumbest girl on earth. I know my search works for the most part as the events tab shows the exact amount of events that occurred within that period of time, however, the statistics tab does not display a table:

index=wineventlog EventCode=4725
| bin span=5m _time
| stats count(user), values(user) by _time EventCode
| where count > 10

I also tried
index=wineventlog EventCode=4725
| bin span=5m _time
| table user, Time 
| search count > 10

Any help would be much appreciated.

Thanks

 

Labels (3)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
index=wineventlog EventCode=4725
| bin span=5m _time
| stats count, values(user) by _time EventCode
| where count > 10
0 Karma
Get Updates on the Splunk Community!

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...