Splunk Search

How do I filter successful events since I am getting too many?

vikramyadav
Contributor

When I login I get too many logon events. How do I filter successful events?
This is the query:-

index="wineventlog" | timechart count span=1m 

And I'm also trying to minimize event size by the add-on "windows_eventsize_reducer" help me to reduce the events.

somesoni2
Revered Legend

Have a look at this

https://gosplunk.com/failed-versus-successful-logon-attempts/
https://answers.splunk.com/answers/127012/how-can-i-use-windows-events-to-monitor-logon-sessions.htm...

You should be able to use the searches in there to figure out the event code filter that you need to apply to your query.

Get Updates on the Splunk Community!

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...

What’s New in Splunk Observability – September 2025

What's NewWe are excited to announce the latest enhancements to Splunk Observability, designed to help ITOps ...