Getting Data In

search for logins to splunk itself

Sean
Engager

I need a search that can show me who is logging into our splunk instance itself. Not monitor logins to systems that are logging to splunk but monitor who is using splunk itself... I am tinkering with something like "index=_internal sourcetype=access_combined" but can't find the actual "login" event.

Tags (1)

drutstein
Explorer

You can use this search:

index=_audit sourcetype=audittrail action=success
0 Karma

gkanapathy
Splunk Employee
Splunk Employee

Actually, if you logins to Splunk as opposed the searches submitted, you can also search:

index=_audit action="login attempt" info=succeeded

Sean
Engager

OK, being kindof stupid, the Search Status dashboard has something like what I am looking for that I can use. One of the panels has "UI activity by user" that can be run separately. Namely: "index="internal" source="/splunkd_access.log" "/services/search/jobs" | kv access-extractions | search uri=/services/search/jobs/* user!="-"| rex (?\d+)ms$ | timechart eval(sum(run_time)/1000) by user" This works for my purposes.

0 Karma
Get Updates on the Splunk Community!

Application management with Targeted Application Install for Victoria Experience

  Experience a new era of flexibility in managing your Splunk Cloud Platform apps! With Targeted Application ...

Index This | What goes up and never comes down?

January 2026 Edition  Hayyy Splunk Education Enthusiasts and the Eternally Curious!   We’re back with this ...

Splunkers, Pack Your Bags: Why Cisco Live EMEA is Your Next Big Destination

The Power of Two: Splunk + Cisco at "Ludicrous Scale"   You know Splunk. You know Cisco. But have you seen ...