- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
zensekibe
Engager
08-07-2014
06:08 PM
I'm finding some splunk commands can detecting unusual event.
For example, each event has username field, usually usernames are same or similar, but sometimes there are some unusual username. So, I want to detect the unusual usernames by splunk command.
I've tried anomalies command, but didn't work as I expected.
Is there any command can reach this goad?
EX)
username
ted000
ted000
ted001
ted002
wan
In this case, I want to detect username wan.
1 Solution
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
gauldridge
Path Finder
08-07-2014
07:07 PM
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
gauldridge
Path Finder
08-07-2014
07:07 PM
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
zensekibe
Engager
08-07-2014
09:24 PM
thank you!
