I'm trying to generate a list of all IP addresses from all events where the user "timg" has a login failure.
I have hundreds of multiline events that look generally like this single event:
Mar 17, 2010 14:36:32 PM: LOGIN SUCCESS - USER:bobb IP:153.168.134.131
... 56 lines omitted ...
Mar 17, 2010 16:44:13 PM: LOGIN SUCCESS - USER:edk IP:211.219.95.138
Mar 17, 2010 16:44:14 PM: Login failed, Invalid password; User:timg
Mar 17, 2010 17:11:14 PM: LOGIN FAILURE - USER:timg IP:149.117.157.158
Mar 17, 2010 17:14:27 PM: LOGIN SUCCESS - USER:johnc IP:167.182.193.115
Mar 17, 2010 17:18:56 PM: LOGIN SUCCESS - USER:carlk IP:221.140.227.28
Mar 17, 2010 17:27:43 PM: Login failed, Invalid password; User:timg
Mar 17, 2010 17:27:43 PM: LOGIN FAILURE - USER:timg IP:53.37.39.27
Mar 17, 2010 18:14:11 PM: Login failed, Invalid password; User:melb
Mar 17, 2010 18:14:11 PM: LOGIN FAILURE - USER:melb IP:127.197.143.245
For this event, the output I'm looking for would be the following two IP addresses:
149.117.157.158
53.37.39.27
This would be relatively easy if each line in the event was correctly parsed as a separate event, with fields like "Date" "Login Status" "User Name" and "IP Address". Unfortunately, I only have user privileges on this Splunk instance, so I cannot create any configuration files to pre-parse the event.
Can someone please provide some suggestions on how to accomplish this using only the search app?
... View more