Splunk Search

search for username that got most 403 status code

sigma
Path Finder

1) I want to list top 10 usernames those got most 403 status codes.
     for example a username named sigma got 2000 of this code. I want to this username be in the top of the list.

2) I want to list top 10 usernames those got most 403 status code on some obejcts.
     for example username named sigma got 2000 of 403 status code on secret object.

 

fields: username, status_code, object_ref

Labels (1)
Tags (2)
0 Karma

Thulasinathan_M
Communicator

Hi @sigma ,

Replace index and sourcetype!!

For your first criteria, it should be something like below:

| index=XXX sourcetype=YYY
| stats count as MaxCount by status_code, username
| where status_code=403
| sort -MaxCount | head 10
| table username



Second criteria is not clear, but please check whether below query meets yours.

| index=XXX sourcetype=YYY
| stats count as MaxCount by status_code, username, object_ref
| where status_code=403
| sort -MaxCount | head 10
| table username

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust
| stats count(eval(status_code=="403")) as count by username
| sort 10 -count

Try something like this

sigma
Path Finder

thanks @ITWhisperer 
I'm very new to Splunk. I tried following search but it did not work:

 

index="XXX"
| stats count(eval(status_code=="403")) as count by username
| sort 10 -count

it gives me a list of all usernames with count 0 each.

 

0 Karma

ITWhisperer
SplunkTrust
SplunkTrust

It sounds like perhaps your status_code field has not been extracted correctly?

Here is a runanywhere example showing the code working.

| makeresults count=100
| fields - _time
| eval status_code="403"
| eval user="X".(random()%20)
| stats count(eval(status_code="403")) as count by user
| sort 10 -count

Which probably means your data does not match how you have described it - please can you provide anonymised examples of your events and the fields you have already extracted?

0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...