Splunk Search

If I have a process id that fails to log in to Splunk, how can I find out what the failure was?

MikeBertelsen
Communicator

I ran this search:

index=_audit action=failure | stats count by _time,user,action

which returned a desired result of:

Audit:[timestamp=12-16-2015 08:46:42.599, user=mybatchprocessid, action=login attempt, info=failed][n/a]

How can I find out what the failure was? Bad password? wrong logon type?

0 Karma
1 Solution

jmallorquin
Builder

Hi,

Have you try just to filter the _internal with the keywords ?

index=_internal error mybatchprocessid

View solution in original post

jmallorquin
Builder

Hi,

Have you try just to filter the _internal with the keywords ?

index=_internal error mybatchprocessid

MikeBertelsen
Communicator

Yes, that was exactly what I needed. Thanks.

0 Karma
Get Updates on the Splunk Community!

.conf24 | Registration Open!

Hello, hello! I come bearing good news: Registration for .conf24 is now open!   conf is Splunk’s rad annual ...

Splunk is officially part of Cisco

Revolutionizing how our customers build resilience across their entire digital footprint.   Splunk ...

Splunk APM & RUM | Planned Maintenance March 26 - March 28, 2024

There will be planned maintenance for Splunk APM and RUM between March 26, 2024 and March 28, 2024 as ...