How to implement aggregation-based detection in OpenSearch Security Analytics?

Hi team,

I’m using OpenSearch 2.19.1 and trying to implement a brute force detection rule using Security Analytics feature. My goal is to trigger an alert when more than 20 failed login events occur within 5 minutes, grouped by the same IP address (azure.signinlogs.caller_ip_address).

I’ve created a custom rule as follows:

yaml : Currently using

id: 25b9c01c-350d-4b95-bed1-836d04a4f324
logsource:
product: azure
title: Multiple Failed Logins From Same IP (Brute Force)
description: Multiple Failed Logins From Same IP (Brute Force)
tags:
falsepositives:
level: high
status: experimental
references:
author: sunil kumar

detection:
condition: Selection_1
Selection_1:
azure.signinlogs.result_type|contains:

  • ‘500121’

aggregation:
type: count
field: azure.signinlogs.caller_ip_address
threshold: 20
timeframe: 5m

I created a detector using this rule, but I noticed that the rule triggers for every matching event, even when only 2 events are ingested in 5 minutes. The visual editor does not show any aggregation options, and I’m unsure how to enforce the grouping and threshold logic.

Questions:

  1. How can I configure the detector to apply aggregation (e.g., count > 20 grouped by IP in 5 minutes)?

  2. Is aggregation supported in custom rules or only in prepackaged ones?

  3. Is there a workaround or YAML syntax to enforce this logic in 2.19.1?

    Note: I tried working with alerting via a per-query execution monitor, and that setup works as expected. However, I want to achieve the same logic using the Security Analytics feature. Will this approach work, or is aggregation not supported in Security Analytics custom rules?

Any guidance or examples would be greatly appreciated.

I am also having same doubt can someone reply plz

Hi @sunil_9944 ,

Did you manage to get this working? I don’t see anything on the docs about this being possible, and I tested but didn’t get it working.

I would suggest creating an issue, I do see two reporting similar - [BUG] Issue with Timeframe and Aggregation Sigma Rule · Issue #1351 · opensearch-project/security-analytics · GitHub & GitHub · Where software is built

To create your own, if you feel it differs from these you can do so here - GitHub · Where software is built .

Leeroy.