Splunk Search

How to search for the count of failed logins in a 10 minute span where a log has 9 or more rejects and an accept at the end?

ThomasLeroy
Explorer

Hello,

I'm trying to count the number of failed logins in a 10 min span. Here is my search:

host=.." AND gateway_username != "''" | transaction fields="src_ip,gateway_username" startswith="'ZV_REJECT'" endswith="'ZV_ACCEPT'" manspan=10m

How can I search for a log with 9 rejects or more and an accept at the end ?

Best regards
Thomas

Tags (3)
1 Solution

somesoni2
Revered Legend

How about this? Assuming there is a field called "Status" which will have values like ZV_REJECT AND ZV_ACCEPT.

host=.." AND gateway_username != "''" | transaction fields="src_ip,gateway_username" startswith="'ZV_REJECT'" endswith="'ZV_ACCEPT'" maxspan=10m | where eventcount>9 AND mvcount(Status)=2

View solution in original post

somesoni2
Revered Legend

How about this? Assuming there is a field called "Status" which will have values like ZV_REJECT AND ZV_ACCEPT.

host=.." AND gateway_username != "''" | transaction fields="src_ip,gateway_username" startswith="'ZV_REJECT'" endswith="'ZV_ACCEPT'" maxspan=10m | where eventcount>9 AND mvcount(Status)=2

ThomasLeroy
Explorer

That's exactly what i want. Thank you 🙂

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...