Knowledge Management

How to search 5 min interval after summary index is populated

gozdeyildiz
New Member

Hello,

I have a search that will extract a field to a summary index and I want to search that field in a specific index after 5 min
Ex;

index=applications message="Request from suspicious actor*" | fields srcIp | | collect index=siem-summary source=example-summary

then 5 min later, i would like to lookup that srcIp in network=index

Thanks in advance!

Labels (1)
0 Karma

to4kawa
Ultra Champion

Hi, @gozdeyildiz
Assuming that a summary index is created every five minutes in reports, etc.

index=network OR (index=siem-summary source=example-summary) 
| stats dc(index) as flag by srcIp
| where flag > 1

This query provides srcIps in index network that is contains in index siem-summary.
How about this?

0 Karma

gozdeyildiz
New Member

Hi @to4kawa,

No actually, there is a search that populates summary index if there is any match. I want that search to trigger another search specific indexes after 5 min of trigger.

0 Karma

to4kawa
Ultra Champion

Splunk can set the search period.
Are you making summaries regularly?
Isn't it the same to search for a summary 5 minutes ago after 5 minutes?

0 Karma
Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...