<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Incomplete UserID in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669349#M229579</link>
    <description>&lt;P&gt;What pattern represents the valid user ids?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(?&amp;lt;userid&amp;gt;[^\"]+@[^\"]+)&lt;/LI-CODE&gt;&lt;P&gt;&lt;A href="https://regex101.com/r/sn0WLe/1" target="_blank"&gt;https://regex101.com/r/sn0WLe/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Nov 2023 15:20:07 GMT</pubDate>
    <dc:creator>ITWhisperer</dc:creator>
    <dc:date>2023-11-21T15:20:07Z</dc:date>
    <item>
      <title>Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669334#M229573</link>
      <description>&lt;P&gt;How to I eliminate partial user id characters coming out of a search query?&amp;nbsp; &amp;nbsp;Here are examples of incomplete userIDs - whereupon they shouldnt appear at all:&amp;nbsp; &amp;nbsp;The middle GSA line is the correct example userID- the rest is garbage and I want to eliminate that&lt;/P&gt;&lt;P&gt;01022703&lt;BR /&gt;021216&lt;BR /&gt;07602381&lt;BR /&gt;"1206931120@GSA.GOV"&lt;BR /&gt;177&lt;BR /&gt;177670&lt;BR /&gt;1969412&lt;BR /&gt;232789&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 14:43:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669334#M229573</guid>
      <dc:creator>sgabriel1962</dc:creator>
      <dc:date>2023-11-21T14:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669349#M229579</link>
      <description>&lt;P&gt;What pattern represents the valid user ids?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;(?&amp;lt;userid&amp;gt;[^\"]+@[^\"]+)&lt;/LI-CODE&gt;&lt;P&gt;&lt;A href="https://regex101.com/r/sn0WLe/1" target="_blank"&gt;https://regex101.com/r/sn0WLe/1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 15:20:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669349#M229579</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-21T15:20:07Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669352#M229582</link>
      <description>&lt;P&gt;where do I find this as Im using defaults coming out of the Windows TA&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 15:33:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669352#M229582</guid>
      <dc:creator>sgabriel1962</dc:creator>
      <dc:date>2023-11-21T15:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669353#M229583</link>
      <description>&lt;P&gt;Perhaps you should tell us a bit more about what you are trying to do - since you posted this in the Splunk Search section, I presume this is part of a search, perhaps for a dashboard or a report? If so, what do you have so far?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 15:35:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669353#M229583</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-21T15:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669358#M229585</link>
      <description>&lt;P&gt;How are you obtaining the user IDs in the first place?&amp;nbsp; Is the field not extracted properly?&amp;nbsp; Is the search not looking for the right thing?&amp;nbsp; How can Splunk distinguish a valid ID from an invalid one?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 15:54:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669358#M229585</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2023-11-21T15:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669367#M229587</link>
      <description>&lt;P&gt;We are configuring for Brute Force login attempts, failures obviously.&amp;nbsp; Here is the search string we have put together as we are working from TAs coming from Splunkbase.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;index=* action=fail* OR action=block* (source=win*security OR sourcetype=linux_secure OR tag=authentication) user=* user!="" user!="*@domanname" user!="USX*" user!="sec-gsa-scan" user!="host/WS Authentication" user!=USERNAME | bucket _time span=1d | stats count by user src _time | stats sum(count) as count by user | sort – count&lt;/P&gt;&lt;P&gt;The list is coming back with all sorts of combinations as listed already, Im attempting to exclude IDs such as USERNAME or host/* as they dont make any sense.&amp;nbsp; &amp;nbsp;I cant post much publicly but you get the idea&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 17:11:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669367#M229587</guid>
      <dc:creator>sgabriel1962</dc:creator>
      <dc:date>2023-11-21T17:11:43Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669377#M229588</link>
      <description>&lt;P&gt;Try something like this (assuming this pattern matches your valid user ids!)&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* action=fail* OR action=block* (source=win*security OR sourcetype=linux_secure OR tag=authentication) user=* user!="" user!="*@domanname" user!="USX*" user!="sec-gsa-scan" user!="host/WS Authentication" user!=USERNAME 
| regex user="[^\"]+@[^\"]+"
| bucket _time span=1d | stats count by user src _time | stats sum(count) as count by user | sort – count&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 17:41:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669377#M229588</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-21T17:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669379#M229590</link>
      <description>&lt;P&gt;I can work from this - this is great thanks = but how can I now only record login attempts &amp;gt; 4 and ignore all others&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2023 17:48:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669379#M229590</guid>
      <dc:creator>sgabriel1962</dc:creator>
      <dc:date>2023-11-21T17:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete UserID</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669380#M229591</link>
      <description>&lt;P&gt;For daily count &amp;gt; 4 per user, do this&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=* action=fail* OR action=block* (source=win*security OR sourcetype=linux_secure OR tag=authentication) user=* user!="" user!="*@domanname" user!="USX*" user!="sec-gsa-scan" user!="host/WS Authentication" user!=USERNAME 
| regex user="[^\"]+@[^\"]+"
| bucket _time span=1d | stats count by user src _time 
| where count &amp;gt; 4
| stats sum(count) as count by user | sort – count&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 21 Nov 2023 17:51:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Incomplete-UserID/m-p/669380#M229591</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2023-11-21T17:51:39Z</dc:date>
    </item>
  </channel>
</rss>

