All Apps and Add-ons

How to track if someone is trying to log in every X minutes or seconds as if programmed to do so?

summitsplunk
Communicator

My query looks like this:

eventtype=ftnt_fgt_event subtype=system host="*" eventtype=ftnt_fgt_auth_privileged status=failed
|stats count by src_user,src,action

How would I check if this query produces results on an X timeframe like every 10min?

0 Karma
1 Solution

woodcock
Esteemed Legend

Like this, for rigid buckets:

eventtype=ftnt_fgt_event subtype=system host="*" eventtype=ftnt_fgt_auth_privileged status=failed
| bin span=10m _time
| stats count BY src_user, src, action, _time

OR this for a sliding window:

eventtype=ftnt_fgt_event subtype=system host="*" eventtype=ftnt_fgt_auth_privileged status=failed
| streamstats time_window=600 count BY src_user, src, action

View solution in original post

woodcock
Esteemed Legend

Like this, for rigid buckets:

eventtype=ftnt_fgt_event subtype=system host="*" eventtype=ftnt_fgt_auth_privileged status=failed
| bin span=10m _time
| stats count BY src_user, src, action, _time

OR this for a sliding window:

eventtype=ftnt_fgt_event subtype=system host="*" eventtype=ftnt_fgt_auth_privileged status=failed
| streamstats time_window=600 count BY src_user, src, action

macadminrohit
Contributor

streamstats and eventstats command are the two which give me hard times everytime 🙂

0 Karma
Get Updates on the Splunk Community!

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...