Getting Data In

Looking for a search to see my splunk users that havent logged into splunk in x days?

smithke
Explorer

I'm looking for a query to see my splunk users that havent logged into splunk in x days. 

Currently looking at this query:

| rest /services/authentication/users splunk_server=local |eval c_time=strftime(last_successful_login,"%m/%d/%y %H:%M:%S") | table title roles last_successful_login c_time

 

However this shows me all users where I only want to see those that havent logged in in x days.

 

Any assistance is appreciated

Labels (1)
0 Karma

saravanan90
Contributor

This may help..

| rest /services/authentication/users splunk_server=local
| search NOT
[ search index=_internal sourcetype=splunkd_ui_access status=200 *authentication*
| dedup user
| table user
| rename user as title ]

0 Karma

isoutamo
SplunkTrust
SplunkTrust
0 Karma

GMoney
Observer

I can't say when this stopped working, but as of version 8.2.4 index=_audit no longer utilizes action=login*.  Run a "| stats values(action)" and you'll see what I mean.

0 Karma

isoutamo
SplunkTrust
SplunkTrust

At 9.0.1 it gives that actions as earlier

index=_audit action=login* earliest=-4h
| stats count by action

 

0 Karma

smithke
Explorer

Thanks but this did not help.

0 Karma
Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI! Discover how Splunk’s agentic AI ...

[Puzzles] Solve, Learn, Repeat: Dereferencing XML to Fixed-length events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Stay Connected: Your Guide to December Tech Talks, Office Hours, and Webinars!

What are Community Office Hours? Community Office Hours is an interactive 60-minute Zoom series where ...