Tools used: Splunk Enterprise, Ubuntu Server, VirtualBox, auth.log
.deb
from splunk.com.sudo dpkg -i splunkfilename.deb
sudo /opt/splunk/bin/splunk start --accept-license
http://localhost:8000
ssh testuser@your_vm_ip
grep "Failed password" /var/log/auth.log
/var/log/auth.log
linux_secure
or custommain
indexUse the following SPL query in the search bar:
index=main "Failed password" sourcetype=linux_secure
Create a new dashboard and add these panels:
Panel 1 – Most failed attempts by IP and user:
index=main "Failed password"
| rex "from (?<ip>\d{1,3}(?:\.\d{1,3}){3})"
| stats count by ip, user
| sort - count
Panel 2 – Timechart of failed attempts:
index=main "Failed password"
| timechart count by host
Set up an alert for high-frequency login failures:
index=main "Failed password"
| stats count by ip
| where count > 5
Save it as an alert in Splunk and set your trigger actions (email, dashboard, etc).
This hands-on project helped me gain experience with log monitoring, threat detection, and SPL.