<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: use stat count in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82770#M21019</link>
    <description>&lt;P&gt;As Ayn says, you're complicating it too much. If you only want to find out how many failed login attempts have been made towards this particular host in each 15 minute period, the following should work.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source = "WinEventLog:Security"  EventCode="529" Source_Network_Address=10.110.12.143 | bucket _time span=15m | stats count(Source_Network_Address) as y by _time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;HR /&gt;

&lt;P&gt;UPDATE:&lt;/P&gt;

&lt;P&gt;Would this be what you want?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source = "WinEventLog:Security"  EventCode="529"  | bucket _time span=15m | stats count values(User_Name) as y by _time Source_Network_Address
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;/Kristian&lt;/P&gt;</description>
    <pubDate>Mon, 25 Jun 2012 10:46:31 GMT</pubDate>
    <dc:creator>kristian_kolb</dc:creator>
    <dc:date>2012-06-25T10:46:31Z</dc:date>
    <item>
      <title>use stat count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82768#M21017</link>
      <description>&lt;P&gt;I working on a query to pinpoint a login attempt failure on a particular network address.. hence i use a count stat on network address, here is my query &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source = "WinEventLog:Security"  EventCode="529" | bucket _time span=15m | stats count(Source_Network_Address) as y by _time Source_Network_Address User_Name Workstation_Name Source_Port 
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;however, the result is not as ideal as i want... now seems like it is counting &lt;STRONG&gt;asdasd&lt;/STRONG&gt; (userName) where i want the source &lt;STRONG&gt;10.110.12.143 being count how many time with the bucket of 15 minute regardless on what user_name&lt;/STRONG&gt; &lt;/P&gt;

&lt;P&gt;so if i do the following &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source = "WinEventLog:Security"  EventCode="529" | bucket _time span=15m | stats count(Source_Network_Address) as y by _time Source_Network_Address User_Name Workstation_Name Source_Port | search y &amp;gt;3
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;i only get result from user_name &lt;STRONG&gt;asdasd&lt;/STRONG&gt;&lt;BR /&gt;
Anyone can guide me on this?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  time                   source_network_Address User_Name Workstation_Name Source_Port y
  6/25/12 4:15:00.000 PM 10.110.12.143          134        SGVM-QA0012         2149    1 
  6/25/12 4:15:00.000 PM 10.110.12.143          asdasd     SGVM-QA0012         2149    4 
  6/25/12 4:15:00.000 PM 10.110.12.143          dfsfds     SGVM-QA0012         2257    1 
  6/25/12 4:15:00.000 PM 10.110.12.143          iojioj     SGVM-QA0012         2149    1 
  6/25/12 4:15:00.000 PM 10.110.12.143          kjnhg      SGVM-QA0012         2257    1 
  6/25/12 4:15:00.000 PM 10.110.12.143          rtyjk      SGVM-QA0012         2257    1 
  6/25/12 4:30:00.000 PM 10.110.12.143          admin      SGVM-QA0012         2118    1 
  6/25/12 4:30:00.000 PM 10.110.12.143          admin      SGVM-QA0012         2280    1 
  6/25/12 4:30:00.000 PM 10.110.12.143          hjtyjty    SGVM-QA0012         2118    1 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 25 Jun 2012 10:02:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82768#M21017</guid>
      <dc:creator>sg5258</dc:creator>
      <dc:date>2012-06-25T10:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: use stat count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82769#M21018</link>
      <description>&lt;P&gt;If you don't want it to split by username, then why are you splitting by username?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jun 2012 10:12:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82769#M21018</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-06-25T10:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: use stat count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82770#M21019</link>
      <description>&lt;P&gt;As Ayn says, you're complicating it too much. If you only want to find out how many failed login attempts have been made towards this particular host in each 15 minute period, the following should work.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source = "WinEventLog:Security"  EventCode="529" Source_Network_Address=10.110.12.143 | bucket _time span=15m | stats count(Source_Network_Address) as y by _time
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;HR /&gt;

&lt;P&gt;UPDATE:&lt;/P&gt;

&lt;P&gt;Would this be what you want?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;source = "WinEventLog:Security"  EventCode="529"  | bucket _time span=15m | stats count values(User_Name) as y by _time Source_Network_Address
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;/Kristian&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jun 2012 10:46:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82770#M21019</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2012-06-25T10:46:31Z</dc:date>
    </item>
    <item>
      <title>Re: use stat count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82771#M21020</link>
      <description>&lt;P&gt;hi, &lt;BR /&gt;
Thanks for the suggestion..&lt;BR /&gt;
I got your point.&lt;BR /&gt;
However, the sample i offer is because i only test on my computer hence the network address is the same..&lt;BR /&gt;
i require to detect ANY OF network_address, it is not particular 1 address. &lt;BR /&gt;
But, anyway still thank you for your point.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2012 01:17:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82771#M21020</guid>
      <dc:creator>sg5258</dc:creator>
      <dc:date>2012-06-26T01:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: use stat count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82772#M21021</link>
      <description>&lt;P&gt;see update above. /k&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2012 07:22:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82772#M21021</guid>
      <dc:creator>kristian_kolb</dc:creator>
      <dc:date>2012-06-26T07:22:38Z</dc:date>
    </item>
    <item>
      <title>Re: use stat count</title>
      <link>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82773#M21022</link>
      <description>&lt;P&gt;great!!!&lt;BR /&gt;
thanks for the update.. it worked now!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jun 2012 09:02:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/use-stat-count/m-p/82773#M21022</guid>
      <dc:creator>sg5258</dc:creator>
      <dc:date>2012-06-26T09:02:19Z</dc:date>
    </item>
  </channel>
</rss>

