<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk counting duplicate events for failed logon in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351324#M7194</link>
    <description>&lt;P&gt;I dedup _time instead and it seemed to work better. Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 20 Sep 2017 20:26:18 GMT</pubDate>
    <dc:creator>bayman</dc:creator>
    <dc:date>2017-09-20T20:26:18Z</dc:date>
    <item>
      <title>Splunk counting duplicate events for failed logon</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351321#M7191</link>
      <description>&lt;P&gt;When the below search is ran, it'll count duplicate failed logons for all users. How do I exclude duplicates in a count?&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;eventtype=msad-failed-user-logons&lt;BR /&gt;
(host="*")|fields&lt;BR /&gt;
_time,signature,src_ip,src_host,src_nt_host,src_nt_domain,user,Logon_Type|stats&lt;BR /&gt;
count by&lt;BR /&gt;
user,src_nt_domain,src_ip,|sort&lt;BR /&gt;
-count|rename user as "Username", src_nt_domain as "Domain", src_ip as&lt;BR /&gt;
"IP Address"&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Tue, 29 Sep 2020 15:53:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351321#M7191</guid>
      <dc:creator>bayman</dc:creator>
      <dc:date>2020-09-29T15:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk counting duplicate events for failed logon</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351322#M7192</link>
      <description>&lt;P&gt;Try this - &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;eventtype=msad-failed-user-logons (host="*")
| fields_time, signature, src_ip, src_host, src_nt_host, src_nt_domain, user, Logon_Type
| dedup signature
| stats count by user, src_nt_domain, src_ip,
| sort - count
| rename user as "Username", src_nt_domain as "Domain", src_ip as "IP Address"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Based on the assumption that the dups will have the same signature.  &lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 23:56:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351322#M7192</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-09-19T23:56:00Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk counting duplicate events for failed logon</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351323#M7193</link>
      <description>&lt;P&gt;Hey @bayman, if @DalJeanis's solution worked then please don't forget to accept their answer to award karma points and close the question. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 19:48:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351323#M7193</guid>
      <dc:creator>lfedak_splunk</dc:creator>
      <dc:date>2017-09-20T19:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk counting duplicate events for failed logon</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351324#M7194</link>
      <description>&lt;P&gt;I dedup _time instead and it seemed to work better. Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 20:26:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351324#M7194</guid>
      <dc:creator>bayman</dc:creator>
      <dc:date>2017-09-20T20:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk counting duplicate events for failed logon</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351325#M7195</link>
      <description>&lt;P&gt;@bayman - thanks for letting us know what worked.  Interesting that the signature might be different between two duplicate events.  Must mean something different from what I was guessing.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 23:50:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Splunk-counting-duplicate-events-for-failed-logon/m-p/351325#M7195</guid>
      <dc:creator>DalJeanis</dc:creator>
      <dc:date>2017-09-20T23:50:55Z</dc:date>
    </item>
  </channel>
</rss>

