Splunk Search

5 and above login failures

robK123
Explorer

I have managed to create a search that finds users that have failed to login within the last 24 hours but I want to only see users who fail to login 5 or more times.

This is what I have so far:

source="secure" sshd "pam_ldap: error trying to bind as user" | top uid

How can I make it so it onlys shows 5 or more failed logins per user?

Thanks,

Tags (2)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

You could filter the results of top like so:

... | top uid | where count >= 5

View solution in original post

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

You could filter the results of top like so:

... | top uid | where count >= 5
0 Karma

robK123
Explorer

That worked perfectly thanks.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...