Alerting

How can I add the "act*" and "target*" fields to this table with "Host" being the primary field?

Earenhart
Path Finder

Hello everyone,

This search is designed to alert on potential password spraying attempts on servers in my environment. I have this search working when I leave out "| appendpipe [table act* target*]", but I am trying to figure out how to add those fields to the results while keeping my created "Server" field intact. Any ideas are greatly appreciated.

index=wineventlog sourcetype=WinEventLog:Security EventCode=4625 
| eval event=_raw
| rex mode=sed field=event "s/[\n\r]//g"
| rex field=event "Subject:.*Security ID:\t*(?.*?)\tAccount Name:(?.*?)\t*Account Domain:\t*(?.*?)Logon ID:\t*(?.*?)Logon Type"
| rex field=event "Account For Which Logon Failed:\tSecurity ID:\t*(?.*?)\tAccount Name:(?.*?)\t*Account Domain:\t*(?.*?)Failure Information" 
| bin _time span=1m 
| stats dc(user) as EvtCounts by src 
| rename src as server
| where EvtCounts >50
| eval Server = server." (".EvtCounts.")"
| table Server
| appendpipe [table act* target*]
Tags (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

The only fields available at the end of your query are 'server' and 'EvtCounts. That's because thestatscommand filters out all fields except those explicitly mentioned. You should be able to avoid that by usingstreamstats`. Like this:

| streamstats dc(user) as EvtCounts by src 
| rename src as server
| where EvtCounts >50
| eval Server = server." (".EvtCounts.")"
| table Server act target*
---
If this reply helps you, Karma would be appreciated.

View solution in original post

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The only fields available at the end of your query are 'server' and 'EvtCounts. That's because thestatscommand filters out all fields except those explicitly mentioned. You should be able to avoid that by usingstreamstats`. Like this:

| streamstats dc(user) as EvtCounts by src 
| rename src as server
| where EvtCounts >50
| eval Server = server." (".EvtCounts.")"
| table Server act target*
---
If this reply helps you, Karma would be appreciated.
0 Karma

Earenhart
Path Finder

Thank you very much Rich! Using streamstats did the trick.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...

Data Persistence in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. What happens if the OpenTelemetry collector ...

Thanks for the Memories! Splunk University, .conf25, and our Community

Thank you to everyone in the Splunk Community who joined us for .conf25, which kicked off with our iconic ...