Splunk Enterprise Security

Using the _time field for throttling within the correlation search.

AL3Z
Builder

Hi all,

In my AD computer account deletion correlation search, I use _time and subjectusername in throttling fields for grouping. Is adding _time to throttling the correct approach? Please correct me if I'm wrong.
query 
index=win sourcetype=XmlWinEventLog EventCode=4743
| bin _time span=5m
| stats values(EventCode) as EventCode, values(signature) as EventDescription, values(TargetUserName) as deleted_computer,  dc(TargetUserName) as computeruser_count by _time SubjectUserName
| where computeruser_count > 20
Time Range set to 
Earliest Time 20m@m
latest now
cron schedule */15 * * * *

Scheduling  set to Continuous

Throttling 
window duration 12 hours

Fields to group by SubjectUserName , _time

Thanks in Advance..

 

Labels (2)
0 Karma

richgalloway
SplunkTrust
SplunkTrust

Throttling works by checking to see if the specified field changed value within the throttle period.  Since _time is always changing it is ineffective as a throttle.

---
If this reply helps you, Karma would be appreciated.
0 Karma

AL3Z
Builder

@richgalloway ,

I need to change the query or its fine to drop the _time from the Throttling group by field name?

0 Karma

richgalloway
SplunkTrust
SplunkTrust

I would drop _time as a throttling field.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Get the T-shirt to Prove You Survived Splunk University Bootcamp

As if Splunk University, in Las Vegas, in-person, with three days of bootcamps and labs weren’t enough, now ...

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...