Splunk Search

Finding events for users that have not been seen in the last X days

Liran
Observer

I need to create a baseline for what is common in an environment before creating a rule.

The rule can be as simple as:

 

search index=x sourcetype=y NOT [search index=x sourcetype=y earliest=-14d  |  table user]

 

The issue is doing an historical search using a simple search. I've looked a few commands including transaction and streamstats but did not manage to find a way to run this search recursively. 

The basic idea is to find a rare value on a specific field that is only seen less than a set threshold (e.g. 10 events) during a 14 days windows.

Labels (2)
Tags (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @Liran ,

please trey something like this:

index=x sourcetype=y
| eval period=if(_time>now()-864000,"last","previous")
| stats count BY period
| search period="last" count<10

in this way you tag the  events in two categories: "last" (Last 10 days) and "previous".

Then you have events if in the last period there are less than a threshold (10 events).

ciao.

Giuseppe

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

Not sure what the question is here - please can you clarify / expand?

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...