Hello Splunk Community,
I'm currently working on creating a search using the tstats command to identify user behavior related to multiple failed login attempts followed by a successful login. I want to use tstats for this due to its efficiency with high volumes of data, compared to the transaction command.
In my case, I want to be able to detect an event sequence where a user has had, let's say, 10 or more failed login attempts, followed by a successful login attempt, within a specified time window (for example, within an hour).
I understand that tstats doesn't provide the same level of detail as transaction for creating sequences of events. However, I'm looking for suggestions on how to use tstats, combined with other SPL commands, to achieve a similar result.
Here's an example of the type of data I'm dealing with:
_time user status
1622890560
user1
failure
1622890620
user1
failure
1622890680
user1
success
In this example, the status field contains "success" or "failure", and the user field contains the user ID.
Any guidance or suggestions would be greatly appreciated.
Thanks in advance for your help!
... View more