Getting Data In

Find a users first logon and last logoff for the day over 30 days

szimmermanftb
New Member

I am able to get the users first and last logon/logoff event for a single day but I cannot figure out how to get it to work per day over 30 days. This is the search I am using now that works for a single day.

sourcetype=wineventlog:security user=| eval time=strftime(_time, "%m/%d/%y %H:%M:%S") |timechart span=1d earliest(time) as start, latest(time) as stop by user

Anyone have an idea how I can make it show this data for multiple days?

Thanks in advance!

Tags (1)
0 Karma

chandan
Observer

Please try this below query guys the best i have got the result as expected

 

| `inactive_accounts(30)` | eval LastTime=strftime(lastTime,"%Y-%m-%d %H:%M:%S.%Q") | sort -_time

 

 

0 Karma

pradeepkumarg
Influencer

Try using date_mday


| stats earliest(_time) as start, latest(_time) as stop by user, date_mday

0 Karma

szimmermanftb
New Member

When I set the time frame for more than 1 day it will only give me the first logon for the first day and the last logoff for the last day.

0 Karma

somesoni2
Revered Legend

You query looks correct to me to get logon/logoff time for the user per day. Could you ensure the search timerange is set as 'last 30 days'?

0 Karma
Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...