<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extract count failed login with only an authentication method in Dashboards &amp; Visualizations</title>
    <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530568#M36030</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; Ok so&amp;nbsp;&lt;SPAN&gt;in another dashboard I need to put the&amp;nbsp;mac address that have login failed with authentication method equal to ethernet and at least one attempt (success or failed) with wireless. I don't know if the problem is clear but In this second dashboard I should not have the mac address in the first dashboard. Have you some ideas?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Nov 2020 10:38:35 GMT</pubDate>
    <dc:creator>marco_massari11</dc:creator>
    <dc:date>2020-11-24T10:38:35Z</dc:date>
    <item>
      <title>Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530553#M36025</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have some syslog cisco. In this log I have login success and failed (field1), the authentication method(field2) and some mac address (field3). I need to create a dashboard that contains only the mac address that have only login failed with authentication method equal to ethernet, so they can't have failed login (or success) with authentication method wireless. Then in another dashboard I need to put the&amp;nbsp;mac address that have login failed with authentication method equal to ethernet and at least one attempt (success or failed) with wireless. I don't know if the problem is clear. I have a query like this:&lt;/P&gt;&lt;P&gt;index=.....................&lt;BR /&gt;| stats values(field1) as status by field3&amp;nbsp;&lt;BR /&gt;| where mvcount(status)=1 and status="failed"&lt;BR /&gt;| dedup field3&lt;BR /&gt;| stats count&amp;nbsp;&lt;/P&gt;&lt;P&gt;This query should take only mac address which have only failed login, I don't know if could help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 09:48:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530553#M36025</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-24T09:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530556#M36026</link>
      <description>&lt;P&gt;&lt;SPAN&gt;index=.....................&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| stats dc(field1) as status_check values(field1) as status by field3 field2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| where status_check=1 AND&amp;nbsp; status="failed"&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;what's this result?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 09:56:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530556#M36026</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-11-24T09:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530563#M36027</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; With your query I have the list of mac address with authentication method equal to ethernet, status check=1 and status=failed.&lt;/P&gt;&lt;P&gt;Is this te list of mac address that have only failed attempts with Ethernet?&lt;/P&gt;&lt;P&gt;I have also different sites, how can I group the mac address? Something like stats count by site? but where in the query?&lt;/P&gt;&lt;P&gt;Thank you so much for your help!&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 10:07:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530563#M36027</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-24T10:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530567#M36029</link>
      <description>&lt;P&gt;yes, this is only failed attempts.&amp;nbsp;&lt;BR /&gt;I don't know your log. so I can't make the query.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 10:30:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530567#M36029</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-11-24T10:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530568#M36030</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; Ok so&amp;nbsp;&lt;SPAN&gt;in another dashboard I need to put the&amp;nbsp;mac address that have login failed with authentication method equal to ethernet and at least one attempt (success or failed) with wireless. I don't know if the problem is clear but In this second dashboard I should not have the mac address in the first dashboard. Have you some ideas?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 10:38:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530568#M36030</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-24T10:38:35Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530572#M36033</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;sample:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults count=1000
| eval mac_address=(random() % 3).(random() % 3).(random() % 3)
| eval status=mvindex(split("success,failed",","),random() % 2)
| eval method=mvindex(split("eth,wifi",","),random() % 2)

| stats count by mac_address status method
| eval method_status=method."_".status
| xyseries mac_address method_status count&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;index=.....................&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| stats&amp;nbsp; count by field3 field2 field1&lt;BR /&gt;| eval field2_field1=field2."_".field1&lt;BR /&gt;| xyseries field3 field2_field1 count&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;and please extract the necessary information.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 10:57:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530572#M36033</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-11-24T10:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530576#M36035</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; sorry but I do not understand what I should wirte in my query first.&lt;/P&gt;&lt;P&gt;index=......&lt;/P&gt;&lt;P&gt;| eval mac_address=(random() % 3).(random() % 3).(random() % 3)&lt;BR /&gt;| eval status=mvindex(split("success,failed",","),random() % 2)&lt;BR /&gt;| eval method=mvindex(split("eth,wifi",","),random() % 2)&lt;/P&gt;&lt;P&gt;| stats count by mac_address status method&lt;BR /&gt;| eval method_status=method."_".status&lt;BR /&gt;| xyseries mac_address method_status count&lt;/P&gt;&lt;P&gt;like this?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 11:13:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530576#M36035</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-24T11:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530578#M36036</link>
      <description>&lt;P&gt;no,&amp;nbsp;&lt;BR /&gt;Sample query can only run itself. Do not append with your query.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchReference/Makeresults" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchReference/Makeresults&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 11:18:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530578#M36036</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2020-11-24T11:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530580#M36037</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp;I tried this one&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;index=.....................&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| stats&amp;nbsp; count by field3 field2 field1&lt;BR /&gt;| eval field2_field1=field2."_".field1&lt;BR /&gt;| xyseries field3 field2_field1 count&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;but I have not results&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 11:29:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530580#M36037</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-24T11:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530587#M36038</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; Sorry I wrote the query wrong, now it's working. In the results I have something like this:&lt;/P&gt;&lt;P&gt;Mac&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Failed/eth&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Failed/wifi&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; Passed/eth&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Passed/wifi&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and for each mac I have the count for each column, the count is the number of attempts?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 12:11:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530587#M36038</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-24T12:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Extract count failed login with only an authentication method</title>
      <link>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530848#M36079</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/184221"&gt;@to4kawa&lt;/a&gt;&amp;nbsp; I think your solution is what I need, I really appreciate your help. So If I want to show&amp;nbsp; the mac address that have only failed attempt whit ethernet I can filter like:&lt;/P&gt;&lt;P&gt;index="cisco" hostname=* mac=* (status=success OR status=failed) (method=eth OR method=wifi)&lt;BR /&gt;| eval site=substr(NetworkDeviceName,1,7) + substr(NetworkDeviceName, -4)&lt;BR /&gt;| stats count by mac&amp;nbsp; status method&lt;BR /&gt;| eval method_status=method."_".status&amp;nbsp;&lt;BR /&gt;| xyseries&amp;nbsp; mac_status_method count&lt;BR /&gt;| fillnull value=NULL "eth_failed" "eth_success" "wifi__failed" "wifi_success"&lt;BR /&gt;| search "eth_failed"&amp;gt;=1 AND "eth_success"="NULL" AND "wifi__failed"="NULL" AND "wifi_success"="NULL"&lt;/P&gt;&lt;P&gt;Have you any suggestion to show the count of mac by site (second line of the query) in a column chart ?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 15:13:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Dashboards-Visualizations/Extract-count-failed-login-with-only-an-authentication-method/m-p/530848#M36079</guid>
      <dc:creator>marco_massari11</dc:creator>
      <dc:date>2020-11-25T15:13:56Z</dc:date>
    </item>
  </channel>
</rss>

