Splunk Search

If I have a process id that fails to log in to Splunk, how can I find out what the failure was?

MikeBertelsen
Communicator

I ran this search:

index=_audit action=failure | stats count by _time,user,action

which returned a desired result of:

Audit:[timestamp=12-16-2015 08:46:42.599, user=mybatchprocessid, action=login attempt, info=failed][n/a]

How can I find out what the failure was? Bad password? wrong logon type?

0 Karma
1 Solution

jmallorquin
Builder

Hi,

Have you try just to filter the _internal with the keywords ?

index=_internal error mybatchprocessid

View solution in original post

jmallorquin
Builder

Hi,

Have you try just to filter the _internal with the keywords ?

index=_internal error mybatchprocessid

MikeBertelsen
Communicator

Yes, that was exactly what I needed. Thanks.

0 Karma
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...