Splunk Enterprise Security

How to create report of excessive failed login user with head 5?

DawoodUlex
New Member

Hi Team,

I want to create a report of excessive failed login users who have more than 5 failed login attempts from an app.

Thanks
Dawood

0 Karma
1 Solution

nickhills
Ultra Champion

| tstats count as failedLogins where (index=yourAuthIndex action!=success earliest=-4h latest=-1h) by user|where failedLogins>5

You may need to change the fields and times to suit your needs.

If my comment helps, please give it a thumbs up!

View solution in original post

0 Karma

nickhills
Ultra Champion

| tstats count as failedLogins where (index=yourAuthIndex action!=success earliest=-4h latest=-1h) by user|where failedLogins>5

You may need to change the fields and times to suit your needs.

If my comment helps, please give it a thumbs up!
0 Karma

nickhills
Ultra Champion

Hi @DawoodUlex try something like this:

...<your search for failed logins>|stats count as failedLogins by user|where failedLogins>5

If my comment helps, please give it a thumbs up!
0 Karma

DawoodUlex
New Member

I am using tstat and it is showing data from very beginning i.e. 2017.

0 Karma
Get Updates on the Splunk Community!

Splunk Forwarders and Forced Time Based Load Balancing

Splunk customers use universal forwarders to collect and send data to Splunk. A universal forwarder can send ...

NEW! Log Views in Splunk Observability Dashboards Gives Context From a Single Page

Today, Splunk Observability releases log views, a new feature for users to add their logs data from Splunk Log ...

Last Chance to Submit Your Paper For BSides Splunk - Deadline is August 12th!

Hello everyone! Don't wait to submit - The deadline is August 12th! We have truly missed the community so ...