Alerting

Creating an alert to find fail login within 15 minutes with a hit of higher than 3 times?

normangoh
Explorer

Hi guys,

I need to create this alert that will fetch failed logins that happen more than 3 times within 15 minutes and display the results as user and the number of events per that user.

I am thinking using something like:

index=indexName eventtype="failed_logins" | bucket _time span=15m

or

index=indexName eventtype="failed_logins" | tranactions <something?> maxspan=15m

Anyone experts can give me some guide?

Tags (2)
0 Karma

stephanefotso
Motivator

Hello! Here you go

index=indexName eventtype="failed_logins" |stats count 

Save it as an Alert!

Title: Failed_alert
Alert Type: Real Time
Trigger Condition: Number of Results
Trigger if Number of Results is : Greater than 3
in : 15 min

For more information, Read here :http://docs.splunk.com/Documentation/Splunk/6.2.3/Alert/Definerolling-windowalerts

Thanks

SGF
0 Karma

gyslainlatsa
Motivator

hi normangoh,
write your query

 index=indexName eventtype="failed_logins" 

and backup simply as an alert with the following characteristics:
alt text

when your research to see all the results, you can use the following query:

 index = indexName eventType = "failed_logins" user = * |table  user  _raw
0 Karma
Get Updates on the Splunk Community!

.conf24 | Day 0

Hello Splunk Community! My name is Chris, and I'm based in Canberra, Australia's capital, and I travelled for ...

Enhance Security Visibility with Splunk Enterprise Security 7.1 through Threat ...

(view in My Videos)Struggling with alert fatigue, lack of context, and prioritization around security ...

Troubleshooting the OpenTelemetry Collector

  In this tech talk, you’ll learn how to troubleshoot the OpenTelemetry collector - from checking the ...