Quantcast
Channel: Questions in topic: "splunk-enterprise"
Viewing all articles
Browse latest Browse all 47296

Query to display results of the login failures occurring in a server from a user more than 2 times

$
0
0
I am trying to craft a search which will display the users who have failed logins more than 2 times against a server. Below is the search I am using. Need help to include the "greater than 2 events" search..... sourcetype=wineventlog:security action=failure Source_Network_Address="x.x.x.x" user!=*$ | eval hostname=case(Source_Network_Address == "x.x.x.x", "YYYY") |stats c as "Event Count" values(signature) as "Login Message" values(hostname) as "Source" min(_time) as start max(_time) as stop by user, action | convert ctime(start) | convert ctime(stop)

Viewing all articles
Browse latest Browse all 47296

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>