Splunk Search

Search for recurring events over multiple time spans

neilsmith2
Explorer

Hi, looking for guidance please on how to alert on recurring auth events over multiple time spans, but I can't get my head around how to construct the search terms

for example:

- user account is locked out =>X per hour for =>X consecutive hours

- user has =>X login failures in an hour for  =>X consecutive  hours 

Hope that makes sense! TIA

Labels (2)
0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

You can set up a report which counts the instances by the hour and then use something like streamstats to determine whether the hours with high counts are consecutive.

0 Karma
Get Updates on the Splunk Community!

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

Get Inspired! We’ve Got Validation that Your Hard Work is Paying Off

We love our Splunk Community and want you to feel inspired by all your hard work! Eric Fusilero, our VP of ...

What's New in Splunk Enterprise 9.4: Features to Power Your Digital Resilience

Hey Splunky People! We are excited to share the latest updates in Splunk Enterprise 9.4. In this release we ...