<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347896#M103014</link>
    <description>&lt;P&gt;It turned out that there was a perl script attempting to use this person's login every 15 minutes to pull data. We are going to convert that functionality into a Splunk Alert.&lt;/P&gt;</description>
    <pubDate>Wed, 05 Apr 2017 18:02:42 GMT</pubDate>
    <dc:creator>grittonc</dc:creator>
    <dc:date>2017-04-05T18:02:42Z</dc:date>
    <item>
      <title>User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347892#M103010</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;

&lt;P&gt;I have inherited shared responsibility for a Splunk instance. We recently had a user departure, and one of the other Splunk admins changed that user's password so that they couldn't login.&lt;/P&gt;

&lt;P&gt;However, when I look in _audit I see that there is a failed login for that user exactly every 15 minutes around the clock. I fear that they left a shell script behind that is trying to login.&lt;/P&gt;

&lt;P&gt;How can I find out the source of these failed attempts? &lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 21:04:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347892#M103010</guid>
      <dc:creator>grittonc</dc:creator>
      <dc:date>2017-03-07T21:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347893#M103011</link>
      <description>&lt;P&gt;Check if there is any saved search owned by that user. That may have an alert action setup or something.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rest /servicesNS/DeparteUserNameHere/-/saved/searches splunk_server=local 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 07 Mar 2017 21:14:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347893#M103011</guid>
      <dc:creator>somesoni2</dc:creator>
      <dc:date>2017-03-07T21:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347894#M103012</link>
      <description>&lt;P&gt;Yeah this sounds like schedule search jobs more than anything.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 21:31:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347894#M103012</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-03-07T21:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347895#M103013</link>
      <description>&lt;P&gt;You could go into Settings -&amp;gt; All configurations in the gui and pick their username as the owner if they are still listed. That would find enough knowledge objects still owned by them to confirm this.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 21:39:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347895#M103013</guid>
      <dc:creator>starcher</dc:creator>
      <dc:date>2017-03-07T21:39:35Z</dc:date>
    </item>
    <item>
      <title>Re: User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347896#M103014</link>
      <description>&lt;P&gt;It turned out that there was a perl script attempting to use this person's login every 15 minutes to pull data. We are going to convert that functionality into a Splunk Alert.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 18:02:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347896#M103014</guid>
      <dc:creator>grittonc</dc:creator>
      <dc:date>2017-04-05T18:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: User has left the company, but audit shows failed logins every 15 minutes. How can I find the source of these failed attempts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347897#M103015</link>
      <description>&lt;P&gt;It wasn't a scheduled search inside splunk, but a script outside of splunk that was trying to log in. We found this out because someone remembered which script it was. &lt;/P&gt;

&lt;P&gt;If we didn't have this knowledge, does anyone know how I would have identified the script that was trying to use these credentials? &lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2017 18:04:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/User-has-left-the-company-but-audit-shows-failed-logins-every-15/m-p/347897#M103015</guid>
      <dc:creator>grittonc</dc:creator>
      <dc:date>2017-04-05T18:04:46Z</dc:date>
    </item>
  </channel>
</rss>

