Getting Data In
Highlighted

How to search for session timeout event in Splunk internal logs for an account?

Explorer

How to search for session timeout event in Splunk internal logs for an account?
... is there any way to find the entries for session timeout?

I have already tried

index=internal OR index=audit host=* user="*" "*logged*" OR "*timed*" OR *session* OR *logout* OR *login*

only results related to login and user-initiated logouts. Nothing related to session timeouts due to user inactivity.

Basically I am trying to debug an account behavior on Splunk Enterprise... we are having two systems and on both we are using same account to login into Splunk web. As per the below documentation for session timeouts:
http://docs.splunk.com/Documentation/Splunk/7.1.1/Admin/Configureusertimeouts

due to user inactivity and configurations for splunkweb and splunkd session timeout the account should timeout in 60mins. Now on both systems we are displaying 2 dashboards with autorefresh on
&ltform refresh="60"&gt
but one dashboard still timesout and the other continues to work without timing out to Splunk login page.

Tags (3)
0 Karma
Highlighted

Re: How to search for session timeout event in Splunk internal logs for an account?

SplunkTrust
SplunkTrust

what are you trying to solve here? iirc splunk does not log the logout action or if you close the browser for example.

0 Karma
Highlighted

Re: How to search for session timeout event in Splunk internal logs for an account?

Builder

Depending if you have configured forwarding your internal logs from the Search Heads to the indexer(s);
index=internal sourcetype=splunkweb_service reason="session-timeout"

0 Karma
Highlighted

Re: How to search for session timeout event in Splunk internal logs for an account?

Explorer

yes they are configured but this reason="session-timeout" doesn't seem to be appearing in the list of reasons.

0 Karma