Alerting

How do I create an alert to give failed logins for Splunk servers?

kellyjos12
New Member

I am trying to create an alert to record failed logins for the Splunk servers, however not all of them show up in my current alert.   I can get the Search Heads and one of my Heavy Forwarders but my Indexers, Deployment/License server and Cluster Master/Monitoring Console server are not reporting.  Is there something that needs to be added or enabled to these servers?

Labels (1)
0 Karma

gcusello
SplunkTrust
SplunkTrust

Hi @kellyjos12,

at first you have to enable log forwarding from all Splunk servers to Indexes to have all Splunk logs in one accessible point: this is a best practice.

then you have to perform a search like the following:

index=_audit sourcetype = audittrail action="login attempt" info=failed
| stats count BY host

then, if you like, you can add a threshold for an alert.

Ciao.

Giuseppe

0 Karma
Get Updates on the Splunk Community!

Celebrating Fast Lane: 2025 Authorized Learning Partner of the Year

At .conf25, Splunk proudly recognized Fast Lane as the 2025 Authorized Learning Partner of the Year. This ...

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...