<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dashboard for Successfully Login in Linux and Windows in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518905#M34832</link>
    <description>&lt;P&gt;Hi Splunk Community&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am completely new on splunk. I somehow managed to deploy the splunk Universal Forwarder on many linux nodes and few windows systems.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to view&amp;nbsp; the /var/log/secure and /var/log/message that are getting indexed and the windows security event log on the created index.&lt;/P&gt;&lt;P&gt;I want a dashboard that shows information of the below :-&lt;/P&gt;&lt;P&gt;1. Number of Hosts where splunk forwarder is deployed (linux and windows separate).&lt;/P&gt;&lt;P&gt;2. Successfull and failed login.&lt;/P&gt;&lt;P&gt;3. Alert when root is logged in linux and Administrator login in windows.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Sep 2020 15:53:17 GMT</pubDate>
    <dc:creator>shubhajits</dc:creator>
    <dc:date>2020-09-10T15:53:17Z</dc:date>
    <item>
      <title>Dashboard for Successfully Login in Linux and Windows</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518905#M34832</link>
      <description>&lt;P&gt;Hi Splunk Community&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am completely new on splunk. I somehow managed to deploy the splunk Universal Forwarder on many linux nodes and few windows systems.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to view&amp;nbsp; the /var/log/secure and /var/log/message that are getting indexed and the windows security event log on the created index.&lt;/P&gt;&lt;P&gt;I want a dashboard that shows information of the below :-&lt;/P&gt;&lt;P&gt;1. Number of Hosts where splunk forwarder is deployed (linux and windows separate).&lt;/P&gt;&lt;P&gt;2. Successfull and failed login.&lt;/P&gt;&lt;P&gt;3. Alert when root is logged in linux and Administrator login in windows.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 15:53:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518905#M34832</guid>
      <dc:creator>shubhajits</dc:creator>
      <dc:date>2020-09-10T15:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard for Successfully Login in Linux and Windows</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518912#M34833</link>
      <description>&lt;P&gt;For dashboards, you would need to create the search matching your need and save it as a view. I would also suggest you completing&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html" target="_blank"&gt;https://www.splunk.com/en_us/training/free-courses/splunk-fundamentals-1.html&lt;/A&gt;&amp;nbsp; and looking at Splunk dashboards example app and Splunk unix app in splunk base -&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/273/" target="_blank"&gt;https://splunkbase.splunk.com/app/273/&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 16:11:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518912#M34833</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2020-09-10T16:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard for Successfully Login in Linux and Windows</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518915#M34834</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/226099"&gt;@shubhajits&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;you're asking many easy things:&lt;/P&gt;&lt;P&gt;1)&lt;/P&gt;&lt;P&gt;to have the list of servers that are sending logs, you could run something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| metasearch index=os or index=wineventlog
| stats count BY index&lt;/LI-CODE&gt;&lt;P&gt;but in this case you have only the servers that are sending logs, if a server is missing you haven't it, but this is another question that you can search in Community.&lt;/P&gt;&lt;P&gt;2)&lt;/P&gt;&lt;P&gt;For successul or unsuccessful logins there's a problem, that every windows login generates around 10-12 login events (EventCode=4624) so the results could be non reliable.&lt;/P&gt;&lt;P&gt;Anyway, the search could be (for windows) something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=wineventlog EventCode=4624 OR EventCode=4625
| stats count BY EventCode&lt;/LI-CODE&gt;&lt;P&gt;and for Linux, something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;search = index=os sourcetype=linux_secure NOT disconnect ("accepted password" OR "failed password")
| eval action=if(searchmatch("accepted password"),"Login","LogFail")
| stats count BY action&lt;/LI-CODE&gt;&lt;P&gt;If you want all in one panel it's just a little bit complicate because you should create four eventtypes:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;windows_login (index=wineventlog EventCode=4624)&lt;/LI&gt;&lt;LI&gt;windows_logfail&amp;nbsp;(index=wineventlog EventCode=4625)&lt;/LI&gt;&lt;LI&gt;linux_login (index=os&amp;nbsp;"accepted password")&lt;/LI&gt;&lt;LI&gt;linux_logfail (index=os&amp;nbsp;"failed password")&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;using the above searches and associating to eventtypes LOGIN or LOGOUT tags, then you can run a simple search using tags:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;tag=LOGIN OR tag=LOGFAIL
| stats count BY index tag&lt;/LI-CODE&gt;&lt;P&gt;3)&lt;/P&gt;&lt;P&gt;About the alert for root or administrator, you have to search for the eventtypes windows_login or linux_login and the words root or administrator, something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;tag=LOGIN (root OR administrator)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only one final hint: follow the Search Tutorial to understand SPL.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 16:14:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Dashboard-for-Successfully-Login-in-Linux-and-Windows/m-p/518915#M34834</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2020-09-10T16:14:40Z</dc:date>
    </item>
  </channel>
</rss>

