Splunk Search

Detecting Simultaneous Sessions

Warme1980
Engager

I have an inhouse written app that outputs an audit log in the form of:

DateTime,Username,Activity,SessionID

So I'll get:

01:01:01,Fred001,Logon,001
01:01:02,Fred001,TakeOverWorld,001
01:01:03,Fred001,Logon,002
01:01:04,Fred001,Logoff,001
01:01:05,Fred001,DestroyWorld,002
01:01:06,Fred001,Logoff,002

Now obviously, aside from taking over the world (which is not against our policies) Fred has shared his password (which is) with someone who destroyed the world (also not explicitly against our policy).

So we need to talk to Fred about his blatant disregard of the simultaneous logon policy.

How do I construct a Splunk query to catch him?

Thanks!

sundareshr
Legend
0 Karma

Warme1980
Engager

Hrm, that might be the thread I need to start tugging on to get to a solution, thanks!

0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Splunk Community Badges!

  Hey everyone! Ready to earn some serious bragging rights in the community? Along with our existing badges ...

[Puzzles] Solve, Learn, Repeat: Matching cron expressions

This puzzle (first published here) is based on matching timestamps to cron expressions.All the timestamps ...