All Apps and Add-ons

Why isn't this query showing iplocation statistics?

summitsplunk
Communicator

index="myIndex" eventtype=ftnt_fgt_event subtype=system host="" eventtype=ftnt_fgt_auth_privileged status=failed src_user="" srcip=* dstip=* |stats count by src_user dstip |iplocation dstip|

The columns show but there's no data.

0 Karma
1 Solution

jerryzhao
Contributor

iplocation can only interpret location info for public ip addresses. Are you sure dstip value is public ip?

View solution in original post

jerryzhao
Contributor

iplocation can only interpret location info for public ip addresses. Are you sure dstip value is public ip?

summitsplunk
Communicator

I see you have a little Fortigate symbol as your emoji. Have you ever worked with the Fortigate App for Splunk? This is what I"m using.

If so do you know how to write a query that checks for failed logins to the FW from outside a particular state?

For example all of our FW are in X state, so if we see login attempts from another state, there might be a problem.

0 Karma

jerryzhao
Contributor

I think you mean srcip doesn't fall into a certain state.
index="myIndex" eventtype=ftnt_fgt_event subtype=system eventtype=ftnt_fgt_auth_privileged status=failed |iplocation srcip |where Region!="California"
This example shows all failed logins out of california

0 Karma

summitsplunk
Communicator

No these where internal IPs. I did not know that.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Updates (ESCU) - New Releases

In the last month, the Splunk Threat Research Team (STRT) has had 3 releases of new content via the Enterprise ...

Thought Leaders are Validating Your Hard Work and Training Rigor

As a Splunk enthusiast and member of the Splunk Community, you are one of thousands who recognize the value of ...

.conf23 Registration is Now Open!

Time to toss the .conf-etti 🎉 —  .conf23 registration is open!   Join us in Las Vegas July 17-20 for ...