<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to compare events from the last two weeks to find authentication success difference? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-events-from-the-last-two-weeks-to-find/m-p/641458#M222226</link>
    <description>&lt;P&gt;I'm trying to create a search using Qualys vulnerability scan data to find hosts that failed to be logged into that were success the previous week.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I've been trying to use&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-can-I-compare-the-results-of-two-weeks-ago-with-one-week-ago/m-p/362574" target="_self"&gt;this similar example &lt;/A&gt;&amp;nbsp;as a template but it doesn't quite get what I'm looking for.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For reference, the Qualys data does not have fields that say something regarding successful or failed authentication attempts - rather they use QIDs.&lt;/P&gt;
&lt;P&gt;QID&amp;nbsp;&lt;/P&gt;
&lt;P&gt;105015 - Windows Failed&lt;/P&gt;
&lt;P&gt;105053 - Unix Failed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;38307 - Unix Successful&lt;BR /&gt;70053- Windows Successful&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Apr 2023 15:21:13 GMT</pubDate>
    <dc:creator>atebysandwich</dc:creator>
    <dc:date>2023-04-26T15:21:13Z</dc:date>
    <item>
      <title>How to compare events from the last two weeks to find authentication success difference?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-events-from-the-last-two-weeks-to-find/m-p/641458#M222226</link>
      <description>&lt;P&gt;I'm trying to create a search using Qualys vulnerability scan data to find hosts that failed to be logged into that were success the previous week.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I've been trying to use&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Search/How-can-I-compare-the-results-of-two-weeks-ago-with-one-week-ago/m-p/362574" target="_self"&gt;this similar example &lt;/A&gt;&amp;nbsp;as a template but it doesn't quite get what I'm looking for.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For reference, the Qualys data does not have fields that say something regarding successful or failed authentication attempts - rather they use QIDs.&lt;/P&gt;
&lt;P&gt;QID&amp;nbsp;&lt;/P&gt;
&lt;P&gt;105015 - Windows Failed&lt;/P&gt;
&lt;P&gt;105053 - Unix Failed&amp;nbsp;&lt;/P&gt;
&lt;P&gt;38307 - Unix Successful&lt;BR /&gt;70053- Windows Successful&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 15:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-events-from-the-last-two-weeks-to-find/m-p/641458#M222226</guid>
      <dc:creator>atebysandwich</dc:creator>
      <dc:date>2023-04-26T15:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: How to compare events from the last two weeks to find authentication success difference?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-compare-events-from-the-last-two-weeks-to-find/m-p/641492#M222231</link>
      <description>&lt;P&gt;Based on the test data you're giving I had to fill some blanks, but if you want to detect a change only, the following could suffice:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;| makeresults format=csv data="
_time,host,qid
2022-04-19,host_a,105015
2022-04-26,host_a,70053
2022-04-19,host_b,38307
2022-04-26,host_b,105053
2022-04-19,host_c,70053
2022-04-26,host_c,70053"
| stats dc(qid) as qid_count, last(qid) as last_qid by host
| where qid_count&amp;gt;1 AND (last_qid="38307" OR last_qid="105053")&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the "stats dc" counts unique qid values by host, where there's more than 1 value it has changed. If you want to detect its last attempt has failed" the last_qid field could be compared to known fail states.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 19:13:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-compare-events-from-the-last-two-weeks-to-find/m-p/641492#M222231</guid>
      <dc:creator>rut</dc:creator>
      <dc:date>2023-04-26T19:13:39Z</dc:date>
    </item>
  </channel>
</rss>

