<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk for Active Directory Dashboard Problem in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44137#M2289</link>
    <description>&lt;P&gt;Okay it looks like my problem is the following. Some of the events do not include some of the extracted fields, like &lt;EM&gt;"src_ip"&lt;/EM&gt; or "&lt;EM&gt;dest_nt_domain&lt;/EM&gt;" do not exist for that event which the saved searches are using to do stats. It looks like I need to find a way to do a conditional stats. I've been looking at using the eval command like on this articlet...&lt;/P&gt;

&lt;P&gt;| eval newfield=if(DNSNAME=="N/A",IP,DNSNAME) | stats count by newfield&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/answers/37007/conditional-field-choice" target="_blank"&gt;http://splunk-base.splunk.com/answers/37007/conditional-field-choice&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 13:25:18 GMT</pubDate>
    <dc:creator>jvargas80</dc:creator>
    <dc:date>2020-09-28T13:25:18Z</dc:date>
    <item>
      <title>Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44134#M2286</link>
      <description>&lt;P&gt;We are testing out the Active Directory for Splunk app and are running into one issue. We are getting data in from our DCs just fine and can query ldap and get results for our searches/dashboards except for one. Under the AD app and Security menu, we select User Logon Failures. Everything in the dashboard populates except for Failed Logons by IP Address. We get No matching events found. When we do an insect, we see the following message.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;DEBUG: base lispy: [ AND host::sdcfisorl01 index::main source::wineventlog:security [ OR 4625 529 530 531 532 533 534 535 536 537 539 675 [ AND 4768 audit failure ] [ AND 4771 audit failure ] ] ]
DEBUG: search context: user="admin", app="Splunk_for_ActiveDirectory", bs-pathname="C:\Program Files\Splunk\etc"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;We have taken the search (eventtype=msad-failed-user-logons (host="SDCFISORL01")|fields _time,signature,src_ip,src_host,src_nt_domain,user,Logon_Type) and entered it in a search box where we get results. We can't figure out why the dashboard is not showing any data. &lt;/P&gt;

&lt;P&gt;Any thoughts?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:23:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44134#M2286</guid>
      <dc:creator>jvargas80</dc:creator>
      <dc:date>2020-09-28T13:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44135#M2287</link>
      <description>&lt;P&gt;There is a big long list there of event codes that your Active Directory systems should be generating.  Take a look for eventtype=msad-failed-user-logons (which expands out to the big long list of event codes) to see if you are getting the data.  It's probably not there.&lt;/P&gt;

&lt;P&gt;My go to reason is that there is a mistake in the audit settings for the GPO that is applied to the domain controllers.  Since you are getting successful events, then take a look at the Logon Audit and Account Logon Audit and ensure that both Success and Failure is checked.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2013 17:29:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44135#M2287</guid>
      <dc:creator>ahall_splunk</dc:creator>
      <dc:date>2013-02-26T17:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44136#M2288</link>
      <description>&lt;P&gt;We are getting both Successes and Failures into Splunk and have confirmed that the GPO is setup correctly. I can see that the dashboard calls the sec_logon_fail.xml view and that specific dashboard report calls the following search.&lt;/P&gt;

&lt;P&gt;"&lt;OBJECT&gt;&lt;PARAM name="search" /&gt;&amp;lt;![CDATA[|&lt;CODE&gt;ip-to-host&lt;/CODE&gt;|&lt;CODE&gt;fix-localhost&lt;/CODE&gt;|stats count by src_host,src_ip|sort -count|rename src_host as "Workstation",src_ip as "IP Address"]]&amp;gt;"&lt;/OBJECT&gt;&lt;/P&gt;

&lt;P&gt;Not sure how to turn this into a complete search that I can try in the Splunk search app.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:24:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44136#M2288</guid>
      <dc:creator>jvargas80</dc:creator>
      <dc:date>2020-09-28T13:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44137#M2289</link>
      <description>&lt;P&gt;Okay it looks like my problem is the following. Some of the events do not include some of the extracted fields, like &lt;EM&gt;"src_ip"&lt;/EM&gt; or "&lt;EM&gt;dest_nt_domain&lt;/EM&gt;" do not exist for that event which the saved searches are using to do stats. It looks like I need to find a way to do a conditional stats. I've been looking at using the eval command like on this articlet...&lt;/P&gt;

&lt;P&gt;| eval newfield=if(DNSNAME=="N/A",IP,DNSNAME) | stats count by newfield&lt;/P&gt;

&lt;P&gt;&lt;A href="http://splunk-base.splunk.com/answers/37007/conditional-field-choice" target="_blank"&gt;http://splunk-base.splunk.com/answers/37007/conditional-field-choice&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:25:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44137#M2289</guid>
      <dc:creator>jvargas80</dc:creator>
      <dc:date>2020-09-28T13:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44138#M2290</link>
      <description>&lt;P&gt;The problem is that this will only work if the extracted field exists and has some value I can check. Anyone know how I can do conditional stats with extracted fields that may or may not be there?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2013 20:44:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44138#M2290</guid>
      <dc:creator>jvargas80</dc:creator>
      <dc:date>2013-02-28T20:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44139#M2291</link>
      <description>&lt;P&gt;I have this exact issue and if I replace dest_nt_domain with scr_nt_domain on 1.1.4 of the app it works. Help? Gonna open a ticket today.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 13:45:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44139#M2291</guid>
      <dc:creator>mbalasko</dc:creator>
      <dc:date>2020-09-28T13:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44140#M2292</link>
      <description>&lt;P&gt;I'm facing the same issue, some news about that ?&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jul 2013 11:03:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44140#M2292</guid>
      <dc:creator>rbw78</dc:creator>
      <dc:date>2013-07-19T11:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk for Active Directory Dashboard Problem</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44141#M2293</link>
      <description>&lt;P&gt;Same issue here, I found out that the field "src_ip" that the dashboard is using doen't exist in the events. &lt;BR /&gt;
So obviously the dashboard can't display anything... &lt;/P&gt;

&lt;P&gt;Any idea why this field doesn't exist on events ? &lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2015 13:41:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-for-Active-Directory-Dashboard-Problem/m-p/44141#M2293</guid>
      <dc:creator>m_varenard</dc:creator>
      <dc:date>2015-05-06T13:41:25Z</dc:date>
    </item>
  </channel>
</rss>

