Part 1: Plan the use case for the correlation search

When to use a correlation search

Define the use case for the search

Find the data to fit the use case

After you determine the security use case that you want your correlation search to address, determine which data sources are relevant to the use case.

  • Determine what data you need to address the use case.
  • Determine which data models and data model objects contain that data in the Splunk App for CIM.
  • Make sure that the data is in the data model.

In this case, the Excessive Failed Logins search looks for data related to logins, so it uses the Authentication data model as the data source. By using a data model rather than searching a specific source type directly, the correlation search can search a wide variety of data sources related to authentication, such as operating systems, applications, or RFID badge readers, without needing to be changed. Relying on data models in correlation searches allow you to write one search for multiple types of data.