<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: search for logins to splunk itself in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9742#M168</link>
    <description>&lt;P&gt;You can use this search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit sourcetype=audittrail action=success
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 26 Oct 2018 18:47:23 GMT</pubDate>
    <dc:creator>drutstein</dc:creator>
    <dc:date>2018-10-26T18:47:23Z</dc:date>
    <item>
      <title>search for logins to splunk itself</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9739#M165</link>
      <description>&lt;P&gt;I need a search that can show me who is logging into our splunk instance itself. Not monitor logins to systems that are logging to splunk but monitor who is using splunk itself...
I am tinkering with something like "index=_internal sourcetype=access_combined" but can't find the actual "login" event.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2010 04:21:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9739#M165</guid>
      <dc:creator>Sean</dc:creator>
      <dc:date>2010-02-15T04:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: search for logins to splunk itself</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9740#M166</link>
      <description>&lt;P&gt;OK, being kindof stupid, the Search Status dashboard has something like what I am looking for that I can use. One of the panels has "UI activity by user" that can be run separately. Namely:
"index="&lt;EM&gt;internal" source="&lt;/EM&gt;/splunkd_access.log" "/services/search/jobs" | kv access-extractions | search uri=/services/search/jobs/* user!="-"| rex (?\d+)ms$ | timechart eval(sum(run_time)/1000) by user"
This works for my purposes.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2010 04:52:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9740#M166</guid>
      <dc:creator>Sean</dc:creator>
      <dc:date>2010-02-15T04:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: search for logins to splunk itself</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9741#M167</link>
      <description>&lt;P&gt;Actually, if you &lt;EM&gt;logins&lt;/EM&gt; to Splunk as opposed the searches submitted, you can also search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit action="login attempt" info=succeeded
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 15 Feb 2010 10:59:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9741#M167</guid>
      <dc:creator>gkanapathy</dc:creator>
      <dc:date>2010-02-15T10:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: search for logins to splunk itself</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9742#M168</link>
      <description>&lt;P&gt;You can use this search:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit sourcetype=audittrail action=success
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 26 Oct 2018 18:47:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/search-for-logins-to-splunk-itself/m-p/9742#M168</guid>
      <dc:creator>drutstein</dc:creator>
      <dc:date>2018-10-26T18:47:23Z</dc:date>
    </item>
  </channel>
</rss>

