Splunk Search

Splunk built in rule question - urgent!

havatz
Explorer

Hello

I have this Splunk built In rule: "  Brute Force Access Behavior Detected Over 1d"

 

 

| tstats `summariesonly` values(Authentication.app) as app,count from datamodel=Authentication.Authentication  where earliest=-1d by Authentication.action,Authentication.src,index | `drop_dm_object_name(\"Authentication\")` | eval success=if(action=\"success\",count,0),failure=if(action=\"failure\",count,0) | stats values(app) as app,sum(failure) as failure,sum(success) as success by src,index | where success > 0 | `mltk_apply_upper(\"app:failures_by_src_count_1d\", \"medium\", \"failure\")` | rex field=index \"(?<bu_prefix>[a-zA-Z]+)\" | lookup org_lookup.csv bu_prefix OUTPUTNEW Organization"

 

1. How can I add to this query indication of which user was used?

2. The query shows app list + number of failures + number of successes, but no correlation of failures/successes to apps, how can I do that?

3. How can I add to the query failure reason?

4. If there is IP address only made several failed login attempts to one user. How can we catch such a scenario?

 

Thanks!

Labels (3)
Tags (2)

havatz
Explorer

Ok i added the user and signature.

this is the updated query:

 

"| tstats `summariesonly` values(Authentication.app) as app,count from datamodel=Authentication.Authentication  where earliest=-1d by Authentication.action,Authentication.src,Authentication.signature,Authentication.user,index | `drop_dm_object_name(\"Authentication\")` | eval success=if(action=\"success\",count,0),failure=if(action=\"failure\",count,0) | stats values(app) as app,sum(failure) as failure,sum(success) as success by src,index,signature,user" | where success > 0 | `mltk_apply_upper(\"app:failures_by_src_count_1d\", \"medium\", \"failure\")` | rex field=index \"(?<bu_prefix>[a-zA-Z]+)\" | lookup org_lookup.csv bu_prefix OUTPUTNEW Organization"

 

Now I need:

1. The query shows app list + number of failures + number of successes, but no correlation of failures/successes to apps, how can I do that?

2. If there is IP address only made several failed login attempts to one user. How can we catch such a scenario?

3. if you see here
https://docs.splunk.com/Documentation/CIM/4.17.0/User/Authentication I can change the "src" to "src_ip" or "src_host" but when Im trying to add "Authentication.src_ip" or "Authentication.src_host" its not working as alias only Authentication_src. what to do?

0 Karma

havatz
Explorer

Hi @inventsekar 

cant see  user field there

"results": [
{
"Organization": "BuildASign",
"bu_prefix": "bas"
},
{
"Organization": "Cimpress China",
"bu_prefix": "cmprcn"
},
{
"Organization": "Cimpress Technology",
"bu_prefix": "cmpr"
},
{
"Organization": "Druck",
"bu_prefix": "drk"
},
{
"Organization": "Easyflyer",
"bu_prefix": "efly"
},
{
"Organization": "Exagroup",
"bu_prefix": "exa"
},
{
"Organization": "National Pen",
"bu_prefix": "npc"
},
{
"Organization": "PixartPrinting",
"bu_prefix": "pixart"
},
{
"Organization": "Printdeal",
"bu_prefix": "printd"
},
{
"Organization": "Tradeprint",
"bu_prefix": "trdpr"
},
{
"Organization": "Vistaprint",
"bu_prefix": "vp"
},
{
"Organization": "WirMachenDruck",
"bu_prefix": "wmd"

0 Karma

inventsekar
SplunkTrust
SplunkTrust

Hi @havatz i am bit new to ES app and on my ES environement, i have 2 other brute force attack searches, but i dont see your search "Brute Force Access Behavior Detected Over 1d" .. is this custom created on your project or is this from ES app?

and the last lookup file org_lookup.csv... does it have a field for user? (when you run "|inputlookup org_lookup.csv", what fields do you get?)

thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Reprocessing XML into Fixed-Length Events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Data Management Digest – December 2025

Welcome to the December edition of Data Management Digest! As we continue our journey of data innovation, the ...

Index This | What is broken 80% of the time by February?

December 2025 Edition   Hayyy Splunk Education Enthusiasts and the Eternally Curious!    We’re back with this ...