<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Creating a detailed table to investigate user account logging into several servers in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-detailed-table-to-investigate-user-account-logging/m-p/502394#M139854</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I'm attempting to build a detailed table complete with timestamp, account name, eventcode, and host. We found that there is an account logging into various servers over a period of 48 hours, but I'm having difficulty creating a proper query. The only column that is filled out is host. Here is what I attempted:&lt;/P&gt;

&lt;P&gt;index="index" Account_Name="account" EventCode="event code" | stats count BY host | eval timestamp=strftime(_time, "%B %d, %D:%M:%S %p") | table timestamp Account_Name host eventcode&lt;/P&gt;

&lt;P&gt;Thank you for any help the community can provide.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 03:16:58 GMT</pubDate>
    <dc:creator>rcastello</dc:creator>
    <dc:date>2020-09-30T03:16:58Z</dc:date>
    <item>
      <title>Creating a detailed table to investigate user account logging into several servers</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-detailed-table-to-investigate-user-account-logging/m-p/502394#M139854</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;

&lt;P&gt;I'm attempting to build a detailed table complete with timestamp, account name, eventcode, and host. We found that there is an account logging into various servers over a period of 48 hours, but I'm having difficulty creating a proper query. The only column that is filled out is host. Here is what I attempted:&lt;/P&gt;

&lt;P&gt;index="index" Account_Name="account" EventCode="event code" | stats count BY host | eval timestamp=strftime(_time, "%B %d, %D:%M:%S %p") | table timestamp Account_Name host eventcode&lt;/P&gt;

&lt;P&gt;Thank you for any help the community can provide.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 03:16:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-detailed-table-to-investigate-user-account-logging/m-p/502394#M139854</guid>
      <dc:creator>rcastello</dc:creator>
      <dc:date>2020-09-30T03:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a detailed table to investigate user account logging into several servers</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Creating-a-detailed-table-to-investigate-user-account-logging/m-p/502395#M139855</link>
      <description>&lt;PRE&gt;&lt;CODE&gt;index="index" Account_Name="account" EventCode="event code" 
| stats count last(_time) as _time by Account_Name host EventCode
| eval timestamp=strftime(_time, "%B %d, %H:%M:%S %p")
| table timestamp Account_Name host EventCode
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hi, @rcastello&lt;BR /&gt;
Is this result what you want to know?&lt;/P&gt;</description>
      <pubDate>Sat, 07 Dec 2019 08:49:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Creating-a-detailed-table-to-investigate-user-account-logging/m-p/502395#M139855</guid>
      <dc:creator>to4kawa</dc:creator>
      <dc:date>2019-12-07T08:49:48Z</dc:date>
    </item>
  </channel>
</rss>

