Feedback
Got feedback? We want it! Submit your comments and suggestions for our community here.

I need to create a rule to get alerts

asakha
Observer
  1. Alert when end-users has logged onto the VPN entry point more than 5 times in a day.
  2. A fail-to-ban feature of IP address if their login fails more than 3times in 1hr.
  3. A weekly report of the end-users IP address logging attempting to log into the VPN entry point.
0 Karma

kiran_panchavat
Contributor

@asakhaYou have to adjust your correlation search as per your fields.This is just a reference.

Alert when end-users has logged onto the VPN entry point more than 5 times in a day.

index=<indexname> sourcetype=<sourcetypename> status=success | stats count by user, _time | bin _time as day | where count > 5 | table user, day, count

A fail-to-ban feature of IP address if their login fails more than 3times in 1hr.

index=<indexname> sourcetype=<sourcetypename> action=failure
| stats count as failed_login_count by src_ip, _time span=1h
| where failed_login_count > 3
| table src_ip, _time, failed_login_count
| eval ban_message="IP address " . src_ip . " exceeded failed login attempts (" . failed_login_count . ")."

Weekly Report of End-Users’ IP Addresses Attempting VPN Logins

index=vpn_logs sourcetype="your_vpn_sourcetype"
| stats count as login_count by user, src_ip, _time span=1w
| table user, src_ip, _time, login_count

 

 

Get Updates on the Splunk Community!

Index This | I’m short for "configuration file.” What am I?

May 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with a Special ...

New Articles from Academic Learning Partners, Help Expand Lantern’s Use Case Library, ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Your Guide to SPL2 at .conf24!

So, you’re headed to .conf24? You’re in for a good time. Las Vegas weather is just *chef’s kiss* beautiful in ...