Splunk Search

[Search] Avg failed logins by user per day

test_qweqwe
Builder
sourcetype=linux_secure |rex "\w{3}\s\d{1,2}\s\d{2}:\d{2}:\d{2}\s\S+\s(?<session>gdm-\w+)\S:\s"| search session=gdm-password | rex "\w{3}\s\d{1,2}\s\d{2}:\d{2}:\d{2}\s(?<hostname>\S+)\s.+\Sgdm-password:auth\S:\s(?<authstatus>\w+\s\w+);\s.+user=(?<username>\S+)" | search authstatus="authentication failure" 

it's shows me all failed auth users on machine and I don't know how to property continuum this search to show avg failed logins by user per day

0 Karma
1 Solution

MonkeyK
Builder

so you already have username and _time. you should be able to do something like this:

base search | bin _time as date span=1d |  stats count by username date| stats avg(count) by username

The first stats will give you daily counts. The second one will average them.
I am not sure if there is a way to combine the two stats commands, so maybe someone else will have something more elegant

View solution in original post

MonkeyK
Builder

so you already have username and _time. you should be able to do something like this:

base search | bin _time as date span=1d |  stats count by username date| stats avg(count) by username

The first stats will give you daily counts. The second one will average them.
I am not sure if there is a way to combine the two stats commands, so maybe someone else will have something more elegant

Get Updates on the Splunk Community!

Introducing the Splunk Community Dashboard Challenge!

Welcome to Splunk Community Dashboard Challenge! This is your chance to showcase your skills in creating ...

Wondering How to Build Resiliency in the Cloud?

IT leaders are choosing Splunk Cloud as an ideal cloud transformation platform to drive business resilience,  ...

Updated Data Management and AWS GDI Inventory in Splunk Observability

We’re making some changes to Data Management and Infrastructure Inventory for AWS. The Data Management page, ...