Splunk Search

search for username that got most 403 status code

sigma
Path Finder

1) I want to list top 10 usernames those got most 403 status codes.
     for example a username named sigma got 2000 of this code. I want to this username be in the top of the list.

2) I want to list top 10 usernames those got most 403 status code on some obejcts.
     for example username named sigma got 2000 of 403 status code on secret object.

 

fields: username, status_code, object_ref

Labels (1)
Tags (2)
0 Karma

Thulasinathan_M
Contributor

Hi @sigma ,

Replace index and sourcetype!!

For your first criteria, it should be something like below:

| index=XXX sourcetype=YYY
| stats count as MaxCount by status_code, username
| where status_code=403
| sort -MaxCount | head 10
| table username



Second criteria is not clear, but please check whether below query meets yours.

| index=XXX sourcetype=YYY
| stats count as MaxCount by status_code, username, object_ref
| where status_code=403
| sort -MaxCount | head 10
| table username

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(status_code=="403")) as count by username
| sort 10 -count

Try something like this

sigma
Path Finder

thanks @ITWhisperer 
I'm very new to Splunk. I tried following search but it did not work:

 

index="XXX"
| stats count(eval(status_code=="403")) as count by username
| sort 10 -count

it gives me a list of all usernames with count 0 each.

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It sounds like perhaps your status_code field has not been extracted correctly?

Here is a runanywhere example showing the code working.

| makeresults count=100
| fields - _time
| eval status_code="403"
| eval user="X".(random()%20)
| stats count(eval(status_code="403")) as count by user
| sort 10 -count

Which probably means your data does not match how you have described it - please can you provide anonymised examples of your events and the fields you have already extracted?

0 Karma
Get Updates on the Splunk Community!

Earn a $35 Gift Card for Answering our Splunk Admins & App Developer Survey

Survey for Splunk Admins and App Developers is open now! | Earn a $35 gift card!      Hello there,  Splunk ...

Continuing Innovation & New Integrations Unlock Full Stack Observability For Your ...

You’ve probably heard the latest about AppDynamics joining the Splunk Observability portfolio, deepening our ...

Monitoring Amazon Elastic Kubernetes Service (EKS)

As we’ve seen, integrating Kubernetes environments with Splunk Observability Cloud is a quick and easy way to ...