Splunk Enterprise Security

Check failed and success from all users with single ip

siddh01r
New Member

Hi,

i am trying to find failed and success from all users with single ip.
so it would show like..

1p 1.1.1.1...users john doe 4 failed and 1 success
jay sean 5 failed 2 success

ip1.2.3.4 ...user tim smith 3 failed 1 sucess

starting query - index=authentication type=* |....

type is type of failure

0 Karma

siddh01r
New Member

index=index (type=f* AND type=s)
| stats count by user, type
| sort -count
| stats list(type) as auth_type, list(count) as count by user

I have used you search and have come up with what i need. however, now i amt trying to be really specific about what i want.
only looking for for where there is fail(f) AND success(s)
but , when i add the "AND" i get no results. when infact there are failed and successful events.

Please help

0 Karma

woodcock
Esteemed Legend

You tagged this post with Enterprise Security so make sure that you configure your sourcetype to be pulled into the Common Information Model and the do this:

| tstats count 
FROM datamodel=Authentication 
WHERE index="*" 
BY Authentication.src Authentication.user Authentication.action
| rename Authentication.* AS *
0 Karma

akshatj2
Path Finder

Sid,

There must be a field like action which provides details for if it is failed login or success login

you can form a search as below

index= (action = success OR action= failed)
| stats count by user, action
| sort -count
| stats list(action) as login_type, list(count) as count by user

Hope this helps.

0 Karma

siddh01r
New Member

index=index (type=f* AND type=s)
| stats count by user, type
| sort -count
| stats list(type) as auth_type, list(count) as count by user

I have used you search and have come up with what i need. however, now i amt trying to be really specific about what i want.
only looking for for where there is fail(f) AND success(s)
but , when i add the "AND" i get no results. when infact there are failed and successful events.

Please help

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.


Introducing Unified TDIR with the New Enterprise Security 8.2

Read the blog
Get Updates on the Splunk Community!

CX Day is Coming!

Customer Experience (CX) Day is on October 7th!! We're so excited to bring back another day full of wonderful ...

Strengthen Your Future: A Look Back at Splunk 10 Innovations and .conf25 Highlights!

The Big One: Splunk 10 is Here!  The moment many of you have been waiting for has arrived! We are thrilled to ...

Now Offering the AI Assistant Usage Dashboard in Cloud Monitoring Console

Today, we’re excited to announce the release of a brand new AI assistant usage dashboard in Cloud Monitoring ...