• Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs
  • Search
  • Dashboards
  • Browse
    • Sourcetype

      • _audit
      • _internal
      • access_combined
      • apache
      • audittrail
      • citrix:netscaler:syslog
      • Cron
      • crowdstrike
      • Dashboards
      • datamodels
      • DBConnect
      • Enterprise Security
      • eval
      • F5
      • Fun Stuff & Helpful Hints
      • Hack
      • Hygiene
      • IIS
      • Juniper
      • Linux Performance
      • linux_secure
      • Malware
      • Monitoring
      • Networking
      • opensense
      • opsec
      • osx_secure
      • Perfmon:Available Memory
      • Perfmon:CPU Load
      • Perfmon:Free Disk Space
      • Perfmon:Network Interface
      • postfix_syslog
      • Qualys
      • REST
      • RFQ – Request For Query
      • splunkd
      • Tenable
      • Uncategorized
      • Unix:Uptime
      • WinEventLog:Application
      • WinEventLog:Security
      • WinEventLog:System
      • WinRegistry
      • WMI:Uptime
    • Tags

      6.1.2 admin apache audit audittrail authentication Cisco Diagnostics failed logon Firewall IIS index indexes internal license License usage Linux linux audit Login Logon malware Network Perfmon Performance qualys REST Security sourcetype splunk splunkd splunk on splunk Tenable Tenable Security Center troubleshoot troubleshooting tstats Universal Forwarder users Vulnerabilities Web Traffic Windows Windows Audit Windows Security _audit _internal
  • Post New Query
  • Our Blog
  • Splunk Jobs

Members

Profile picture of john117

john117

@john117 Active 6 years, 3 months ago
Just another day in the life of a splunk administrator! View
  • Activity
  • Profile
  • Posts
  • Personal
  • Mentions
  • Favorites
  • Profile picture of john117
    6 years, 5 months ago

    john117 wrote a new post

    The following Splunk query will show a table of all users and their roles:
    | rest /services/authentication/users | stats values(roles) as Roles by user
    *Admin Notes*
    I’ve found the following query to work […]

  • Profile picture of john117
    6 years, 5 months ago

    john117 wrote a new post

    This Splunk query shows when the admin account performed Create or Modify Roles actions:
    index=”_audit” action=edit_roles operation=* | table _time user operation object*

  • Profile picture of john117
    6 years, 5 months ago

    john117 wrote a new post

    This Splunk query shows when the admin account performed Account Modification / Deletion / Creation actions:
    index=_audit user=admin action=edit_user operation=* | table _time user operation object*

  • Profile picture of john117
    6 years, 5 months ago

    john117 wrote a new post

    This Splunk query should show which users attempted to modify an index and if that action was successful:
    index=_audit user=* action=indexes_edit | stats count by index info user action

  • Profile picture of john117
    6 years, 5 months ago

    john117 wrote a new post

    This Splunk query / search shows historical access to dashboards and apps on a local splunk server.
    index=_internal sourcetype=splunk_web_access host=* user=*
    | rex field=uri_path “.*/(?[^/]*)$”
    | join […]

    • Profile picture of SplunkNinja
      SplunkNinja replied 6 years, 1 month ago

      Inogues,

      Absolutely! I’ll edit this to fix it :)

    • Profile picture of gr33nlant3rn
      gr33nlant3rn replied 5 years, 1 month ago

      This is GREAT!

      Is there a way to map the user to their email or name? Would that require another join of some sort?

      I looked into the base search and didn’t see an email or name field.

  • Profile picture of john117
    6 years, 7 months ago

    john117 wrote a new post

    Use the following simple tstats query to return the latest time events came in for a given index as well as list all sourcetypes for each index:
    |tstats values(sourcetype) as Sourcetype latest(_time) as Time […]

  • Profile picture of john117
    6 years, 8 months ago

    john117 commented on the post, Potential Suspicious Activity in Windows

    In reply to: john117 wrote a new post Potential Suspicious Activity in WindowsThe following Splunk search should be ran over a long period of time (at least it worked best that way in my environment). This query will show […] View

    Try it without the Evals. Sorry haven’t touched this in a while (and clearly haven’t commented on this!). I’m no longer working in an environment that uses this query.

  • Profile picture of john117
    6 years, 8 months ago

    john117 commented on the post, List forwarders generating socket errors due to unkown SSL protocol

    In reply to: wrangler2x wrote a new post If you are using SSL on port 9997 or 9998 (or other port) to send logs from your forwarders to your indexers, you know that a misconfigured forwarder or one with incorrect certs can […] View

    Thanks for sharing! I do not have a default “dnsLookup” in my environment. Did you build this with an app or acquire it from your networking team and upload it as a lookup?

    If the query works the way I think it works, this is pretty neat!

  • Profile picture of john117
    6 years, 10 months ago

    john117 commented on the post, Clean or Delete Data in a given Source

    In reply to: SplunkNinja wrote a new post The following Splunk query will wipe or clear a data source. Ensure you specify an index else it will wipe the given source for all indexes. source=pathtosourcename | delete View

    It should be noted that this will not actually wipe the data, but simply hide it from view.

  • Profile picture of john117
    8 years, 2 months ago

    john117 wrote a new post

    This Splunk Query shows if there is a time offset on your Splunk servers. I borrowed and modified this one from the splunk clock skew search posted on http://www.bbosearch.com (another pretty awesome site like this […]

  • Profile picture of john117
    8 years, 4 months ago

    john117 wrote a new post

    This will show events that have been sent to the null que within the splunk internal logs.

     
    index=_internal component=metrics processor=nullqueue group=pipeline sourcetype=splunkd | table _time log_level […]

  • Profile picture of john117
    8 years, 5 months ago

    john117 posted an update

    Just another day in the life of a splunk administrator!

  • Profile picture of john117
    8 years, 5 months ago

    john117 wrote a new post

    Potential Suspicious Activity in WindowsThe following Splunk search should be ran over a long period of time (at least it worked best that way in my environment). This query will show potentially […]

    • Profile picture of wrangler2x
      wrangler2x replied 8 years, 4 months ago

      I get the following error running this search (Splunk 6.1.5):

      Error in ‘eval’ command: The expression is malformed. An unexpected character is reached at ‘0)’.

    • Profile picture of Drdosia
      Drdosia replied 8 years, 4 months ago

      I get a similar error with version 6.5.1:
      Error in ‘eval’ command: The expression is malformed. An unexpected character is reached at ‘0)’.

      Appears to be in: (eval Short_Message=mvindex(Message,0)

    • Profile picture of Drdosia
      Drdosia replied 8 years, 4 months ago

      Hmm posting error with //
      Lets try this again:
      (eval Short_Message=mvindex(Message,/0)

    • Profile picture of Drdosia
      Drdosia replied 8 years, 4 months ago

      “eval Short_Message=mvindex(Message,0) “

    • Profile picture of Drdosia
      Drdosia replied 8 years, 4 months ago

      Argh…html….
      eval Short_Message=mvindex(Message,LessThanSign wbr Right slash //GreaterThanSign>0)

    • Profile picture of GhostLeviathan
      GhostLeviathan replied 6 years, 9 months ago

      having the same issue with that eval short message.

    • Profile picture of john117
      john117 replied 6 years, 8 months ago

      Try it without the Evals. Sorry haven’t touched this in a while (and clearly haven’t commented on this!). I’m no longer working in an environment that uses this query.

  • Profile picture of john117
    8 years, 5 months ago

    john117 wrote a new post

    The following splunk search looks for changes in services within Windows.

     
    sourcetype=”WinEventLog:System” EventCode=7045 NOT (Service_Name=mgmt_service) | eval Message=split(Message,”.”) | eval […]

  • Profile picture of john117
    8 years, 5 months ago

    john117 wrote a new post

    This splunk search will show file shares being accessed within windows environments.
    sourcetype=”WinEventLog:Security” EventCode=5140 (Share_Name=”*C$” OR Share_Name=”*D$” OR Share_Name=”*E$” OR […]

  • Profile picture of john117
    8 years, 9 months ago

    john117 changed their profile picture

  • Profile picture of john117
    9 years, 6 months ago

    john117 became a registered member

  • Home
  • Log In
  • Register
  • About GoSplunk
  • GoSplunk FAQs
  • Contact the GoSplunk Team
  • Splunk Website
  • Splunk Documentation
  • Splunk Answers

GoSplunk is not affiliated with Splunk Inc. in any way.

© 2019 GoSplunk
  • Privacy Policy
  • Terms and Conditions
  • Forgot Password?
sponsored