Ad slot: top

SPL

Failed Attempts to Logon to Splunk Web

Description

Submitted by SplunkNinja

The following Splunk Search Query will return all users who have failed to logon to the Splunk Web console. This query will also include an average (from eventstats).  
4 2
index=_audit action="login attempt" info=failed | timechart count(user) as Failed_Attempts| eventstats avg(Failed_Attempts) as Average

Comments

5 total

JA
JayhawkATL
1/30/2016

I get zero events over All Time when I search for:\r\n\r\nindex=_audit action=\"login attempt\"\r\n\r\nLogging parameter not set correct???

SP
SplunkNinja Author
2/1/2016

I've made a revision. Looks like either I had a custom defined field, or the splunk search language has changed (most likely the former).\r\n\r\nThanks for pointing this out :)

JA
Jay
9/4/2019

Where is the revised version?

SP
SplunkNinja Author
9/5/2019

It's been....~6 months. I'm going to assume I updated the original here :)

PO
Pogoista
6/23/2021

index=_internal source=\"/opt/splunk/var/log/splunk/splunkd.log\" ERROR UiAuth

Leave a comment

You must log in to post a comment.

Ad slot: bottom