Splunk Enterprise Security

How to find count of alerts triggered based on time period it occurred?

Satish15_
New Member

I am looking for the count of alerts based on time period it occurred.
For example : excessive failed logins has occurred 250 times in last 24hrs
or watchlisted event observed has occurred 10 times in last 24hrs.

I see that this feature is available in security posture but since it uses 'es_notable_events' it takes events outside the time boundaries

0 Karma

DEAD_BEEF
Builder

I think you're asking how to show alerts that exceed a pre-defined threshold within a fixed time period. If so, can you try this:

index=[index_name]  action=failed | bucket _time span=24h | stats count by src_ip,username | where count >= 250

I think it might be better to narrow your time window because if someone were trying to brute-force a login, it would be a high fail count in a short amount of time unless they are really trying to be covert. 250 events in 24 hours is averaging 10/hour. I'd look for something like >10 in 5 minutes. Unless of course your system locks the account after X failed logins within 15 mins or so, hence the slow roll of 250 over the course of 24 hours. Just at thought!

0 Karma
Get Updates on the Splunk Community!

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...