Splunk Search

5 and above login failures

robK123
Explorer

I have managed to create a search that finds users that have failed to login within the last 24 hours but I want to only see users who fail to login 5 or more times.

This is what I have so far:

source="secure" sshd "pam_ldap: error trying to bind as user" | top uid

How can I make it so it onlys shows 5 or more failed logins per user?

Thanks,

Tags (2)
0 Karma
1 Solution

martin_mueller
SplunkTrust
SplunkTrust

You could filter the results of top like so:

... | top uid | where count >= 5

View solution in original post

0 Karma

martin_mueller
SplunkTrust
SplunkTrust

You could filter the results of top like so:

... | top uid | where count >= 5
0 Karma

robK123
Explorer

That worked perfectly thanks.

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...