<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SPL Query Error in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705442#M238843</link>
    <description>&lt;P&gt;I am trying to write an spl query to detect an event of a single source IP address&amp;nbsp; or a user fails multiple time to login to multiple accounts.&lt;/P&gt;&lt;P&gt;can anyone help me write it.&lt;/P&gt;</description>
    <pubDate>Wed, 27 Nov 2024 21:12:32 GMT</pubDate>
    <dc:creator>adoumbia</dc:creator>
    <dc:date>2024-11-27T21:12:32Z</dc:date>
    <item>
      <title>SPL Query Error</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705442#M238843</link>
      <description>&lt;P&gt;I am trying to write an spl query to detect an event of a single source IP address&amp;nbsp; or a user fails multiple time to login to multiple accounts.&lt;/P&gt;&lt;P&gt;can anyone help me write it.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2024 21:12:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705442#M238843</guid>
      <dc:creator>adoumbia</dc:creator>
      <dc:date>2024-11-27T21:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: SPL Query Error</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705444#M238845</link>
      <description>&lt;P&gt;Please share some sample anonymised events so that we can see what you are dealing with. Please explain which parts of the events are important for what you are trying to discover. Please share what you would like the results to look like. Without this type of information, we are reduced to attempting to read your mind (and my mind-reading license has been revoked after the unfortunate incident with the estate agent!)&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2024 21:18:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705444#M238845</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-11-27T21:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: SPL Query Error</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705445#M238846</link>
      <description>&lt;P&gt;i want to find out which IP address, hostname or username has failed multiple time to login to multiple accounts.&lt;BR /&gt;I am trying to detect brute force attack.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2024 21:33:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705445#M238846</guid>
      <dc:creator>adoumbia</dc:creator>
      <dc:date>2024-11-27T21:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: SPL Query Error</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705450#M238847</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Please share some sample anonymised events so that we can see what you are dealing with. Please explain which parts of the events are important for what you are trying to discover. Please share what you would like the results to look like. Without this type of information, we are reduced to attempting to read your mind (and my mind-reading license has been revoked after the unfortunate incident with the estate agent!)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2024 21:44:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705450#M238847</guid>
      <dc:creator>ITWhisperer</dc:creator>
      <dc:date>2024-11-27T21:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: SPL Query Error</title>
      <link>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705468#M238849</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/232033"&gt;@adoumbia&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;as&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/225168"&gt;@ITWhisperer&lt;/a&gt;&amp;nbsp;said, it's really difficoult to help you without knowing the events to apply the search.&lt;/P&gt;&lt;P&gt;Anyway, if you need a brute force attack sample search, you can see in the Splunk Security Essentials App (&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/3435" target="_blank"&gt;https://splunkbase.splunk.com/app/3435&lt;/A&gt;&amp;nbsp;) where you can find what you're searching and many other Security Use Cases.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 07:48:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/SPL-Query-Error/m-p/705468#M238849</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2024-11-28T07:48:23Z</dc:date>
    </item>
  </channel>
</rss>

