<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic looking for unknown but equal field values across single search in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58935#M14495</link>
    <description>&lt;P&gt;I'm doing a search for invalid logons for our vpn logs. But I want the search results to return when the invalid attempts reach 5 or more from the same user but I don't know the user ahead of time. If a user has 5 or more invalid logon attempts, I want it to alert. Right now I can get all the invalid attempts from all users in the time frame I'm looking at but I don't know how to narrow that down to just alerting on if one user has 5 or more attempts. Please help. Thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 28 Sep 2010 04:18:19 GMT</pubDate>
    <dc:creator>aanetserv</dc:creator>
    <dc:date>2010-09-28T04:18:19Z</dc:date>
    <item>
      <title>looking for unknown but equal field values across single search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58935#M14495</link>
      <description>&lt;P&gt;I'm doing a search for invalid logons for our vpn logs. But I want the search results to return when the invalid attempts reach 5 or more from the same user but I don't know the user ahead of time. If a user has 5 or more invalid logon attempts, I want it to alert. Right now I can get all the invalid attempts from all users in the time frame I'm looking at but I don't know how to narrow that down to just alerting on if one user has 5 or more attempts. Please help. Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2010 04:18:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58935#M14495</guid>
      <dc:creator>aanetserv</dc:creator>
      <dc:date>2010-09-28T04:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: looking for unknown but equal field values across single search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58936#M14496</link>
      <description>&lt;P&gt;Have you tried attaching the following to your search (you will need to replace user with the field that represents your failed user) &lt;/P&gt;

&lt;P&gt;"your search here" | stats count by user | search count &amp;gt; 4&lt;/P&gt;

&lt;P&gt;This should filter the failed users to only show ones that have failed 5 times or more.  &lt;/P&gt;

&lt;P&gt;travis.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2010 21:45:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58936#M14496</guid>
      <dc:creator>thall79</dc:creator>
      <dc:date>2010-09-28T21:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: looking for unknown but equal field values across single search</title>
      <link>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58937#M14497</link>
      <description>&lt;P&gt;Thanks, that's what I was looking for, it worked.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Oct 2010 01:25:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/looking-for-unknown-but-equal-field-values-across-single-search/m-p/58937#M14497</guid>
      <dc:creator>aanetserv</dc:creator>
      <dc:date>2010-10-02T01:25:00Z</dc:date>
    </item>
  </channel>
</rss>

