Alerting

Create alert for 5+ failed authentications for any single user

clwboscovs
Engager

I want to create an alert that monitors 5+ authentication failures for VPN login within an hour, but I'm not sure how to get the alert to monitor for 5+ failures for any single user.

Here's an example log:

[2020-08-17 11:40:10,550] [IG Audit Writer] [INFO ] [IG.AUDIT] [AUD7505] [VPN_AD_Group/user] The Radius server ise_servers rejected authentication for user VPN_AD_Group/user.

Labels (1)
Tags (1)
0 Karma
1 Solution

impurush
Contributor

@clwboscovs 

Could you please tell me what is the user name in your log?
And is it already the user name is extracted into any field?


index=<your index> sourcetype=<your sourcetype> "The Radius server ise_servers rejected authentication"
| stats count by user
| where count > 5

 

View solution in original post

thambisetty
SplunkTrust
SplunkTrust
index=yourindex rejected authentication 
| rex "\s(?<user>[\w\/]+)\.$"
| stats count by user 
| where count > 5
————————————
If this helps, give a like below.

impurush
Contributor

@clwboscovs 

Could you please tell me what is the user name in your log?
And is it already the user name is extracted into any field?


index=<your index> sourcetype=<your sourcetype> "The Radius server ise_servers rejected authentication"
| stats count by user
| where count > 5

 

clwboscovs
Engager

The field for the sourcetype is "user", so your solution works for me perfectly. Thank you!

0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...