<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to search user concurrent logins on unique hosts? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626992#M217904</link>
    <description>&lt;P&gt;I'm hoping to get some help or direction. I have seen a few different forum posts where the search pulled how many concurrent sessions were happening at a time. (General count of sessions occurring at a given time) I somewhat get that done with this search:&lt;/P&gt;
&lt;P&gt;index=main EventCode=4624&amp;nbsp;&lt;BR /&gt;| eval Account=mvindex(Account_Name,1)&lt;BR /&gt;| eventstats dc(host) AS Logins by Account&lt;BR /&gt;| where Logins &amp;gt; 1&lt;BR /&gt;| timechart count(Logins) BY Account&lt;BR /&gt;&lt;BR /&gt;I am hoping to pivot into a search with more detail such as Account login session duration and any overlap in sessions from unique hosts. The goal is to pinpoint potentially shared credentials for further investigation. I have played with transaction a bit, but can't seem to get it to work the way I need and have read many posts advising against this command due to resource usage.&amp;nbsp; Any tips for a Splunk Newb?&lt;/P&gt;</description>
    <pubDate>Fri, 13 Jan 2023 00:35:21 GMT</pubDate>
    <dc:creator>jayygee3</dc:creator>
    <dc:date>2023-01-13T00:35:21Z</dc:date>
    <item>
      <title>How to search user concurrent logins on unique hosts?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626992#M217904</link>
      <description>&lt;P&gt;I'm hoping to get some help or direction. I have seen a few different forum posts where the search pulled how many concurrent sessions were happening at a time. (General count of sessions occurring at a given time) I somewhat get that done with this search:&lt;/P&gt;
&lt;P&gt;index=main EventCode=4624&amp;nbsp;&lt;BR /&gt;| eval Account=mvindex(Account_Name,1)&lt;BR /&gt;| eventstats dc(host) AS Logins by Account&lt;BR /&gt;| where Logins &amp;gt; 1&lt;BR /&gt;| timechart count(Logins) BY Account&lt;BR /&gt;&lt;BR /&gt;I am hoping to pivot into a search with more detail such as Account login session duration and any overlap in sessions from unique hosts. The goal is to pinpoint potentially shared credentials for further investigation. I have played with transaction a bit, but can't seem to get it to work the way I need and have read many posts advising against this command due to resource usage.&amp;nbsp; Any tips for a Splunk Newb?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 00:35:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626992#M217904</guid>
      <dc:creator>jayygee3</dc:creator>
      <dc:date>2023-01-13T00:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: User Concurrent Logins on Unique Hosts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626994#M217905</link>
      <description>&lt;P&gt;Session 'duration' is a fun one, as you need to be able to determine what constitutes the 'end' of the session.&lt;/P&gt;&lt;P&gt;The advice round 'transaction' is good - avoid where possible, it's rarely necessary and almost never the solution for looking for long lived things.&lt;/P&gt;&lt;P&gt;streamstats and stats are generally what you can use.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's a recent post on doing something similar, which gives examples of how you can build things&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-to-calculate-session-times-from-large-data-set/m-p/621763#M216135" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Search/How-to-calculate-session-times-from-large-data-set/m-p/621763#M216135&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 00:15:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626994#M217905</guid>
      <dc:creator>bowesmana</dc:creator>
      <dc:date>2023-01-13T00:15:59Z</dc:date>
    </item>
    <item>
      <title>Re: User Concurrent Logins on Unique Hosts</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626995#M217906</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/6367"&gt;@bowesmana&lt;/a&gt;&amp;nbsp;thanks! I read through the thread and I think I am starting to get a better idea of how to approach my situation. Appreciate the quick response!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 00:29:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-search-user-concurrent-logins-on-unique-hosts/m-p/626995#M217906</guid>
      <dc:creator>jayygee3</dc:creator>
      <dc:date>2023-01-13T00:29:15Z</dc:date>
    </item>
  </channel>
</rss>

