<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nutanix in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Nutanix/m-p/558376#M158609</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We configured logs of a nutanix cluster to be pushed to splunk.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside splunk, I can see logs that shows that [An unsuccessful login attempt was made with username: xxx]&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;How can I churn this out to a report. I am kind of lost where on how to start.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can someone please explain or guide me along?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank You&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Alex&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Jul 2021 09:46:16 GMT</pubDate>
    <dc:creator>splunknewbie81</dc:creator>
    <dc:date>2021-07-06T09:46:16Z</dc:date>
    <item>
      <title>Nutanix</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Nutanix/m-p/558376#M158609</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We configured logs of a nutanix cluster to be pushed to splunk.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside splunk, I can see logs that shows that [An unsuccessful login attempt was made with username: xxx]&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;How can I churn this out to a report. I am kind of lost where on how to start.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can someone please explain or guide me along?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank You&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Alex&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 09:46:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Nutanix/m-p/558376#M158609</guid>
      <dc:creator>splunknewbie81</dc:creator>
      <dc:date>2021-07-06T09:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Nutanix</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Nutanix/m-p/558378#M158610</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236088"&gt;@splunknewbie81&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;at first, you have to study the eventtypes of your logs: e.g. if the condition for the logfail event of nutanix is only "&lt;SPAN&gt;An unsuccessful login attempt was made", you could create and save an eventtype like this&lt;/SPAN&gt;:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nutanix "An unsuccessful login attempt was made"&lt;/LI-CODE&gt;&lt;P&gt;I don't know if there are other conditions but you have the knowledge of Nutanix to find all the conditions!&lt;/P&gt;&lt;P&gt;Remember that to make a search in Splunk 70% of the job is to know what to search and 30% is to build the search in Splunk!&lt;/P&gt;&lt;P&gt;So e.g. if you have to find the condition for the logfail in windows you have to take events with EvenCode=4625, 4771, 537, 536, 539, 531, etc...&lt;/P&gt;&lt;P&gt;Coming back to your search, when you identified the logfail condition, you have to extract the interesting fields: if you have a pair fieldname=fieldvalue, Splunk automatically extract the field, otherwise you have to manually extract it using a regex, in your case, something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| rex "An unsuccessful login attempt was made with username: (?&amp;lt;user&amp;gt;\w+)"&lt;/LI-CODE&gt;&lt;P&gt;Then you have to create your table, e.g. displaying all logfails:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nutanix "An unsuccessful login attempt was made"
| rex "An unsuccessful login attempt was made with username: (?&amp;lt;user&amp;gt;\w+)"
| table _time user&lt;/LI-CODE&gt;&lt;P&gt;If otherwise you want the number of logfails for each user, you could run something like this:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=nutanix "An unsuccessful login attempt was made"
| rex "An unsuccessful login attempt was made with username: (?&amp;lt;user&amp;gt;\w+)"
| stats count BY user&lt;/LI-CODE&gt;&lt;P&gt;You can enrich your search in many ways, but I hint to follow the Search Tutorial for this (&lt;A href="https://docs.splunk.com/Documentation/Splunk/8.2.1/SearchTutorial/WelcometotheSearchTutorial" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/8.2.1/SearchTutorial/WelcometotheSearchTutorial&lt;/A&gt;) or splunk training or videos on YouTube.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 10:10:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Nutanix/m-p/558378#M158610</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2021-07-06T10:10:28Z</dc:date>
    </item>
  </channel>
</rss>

