@cR0w @jerry for this circumstance, the right infrastructure is "just logging". so long as the logs contain things like source ip, user they tried to auth as, user agent, and timestamp - just those alone, across a few hundred million lines of log data will show you way more than you expect.