<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access model in the test AD environment in Security</title>
    <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/685961#M17791</link>
    <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;1. You're on the right track. &lt;A href="https://splunkbase.splunk.com/app/1151" target="_blank"&gt;https://splunkbase.splunk.com/app/1151&lt;/A&gt; is what you need to be using. The documentation for this add-on has information about how the ldapsearch part works. You can run ldapsearch commands via the command line of wherever this is configured. If you're wanting to import certain ldap data, you'll need to create scheduled searches (on the HFW) to pull that data into Splunk. Read through &lt;A href="https://docs.splunk.com/Documentation/SA-LdapSearch/3.0.8/User/AbouttheSplunkSupportingAdd-onforActiveDirectory" target="_blank"&gt;https://docs.splunk.com/Documentation/SA-LdapSearch/3.0.8/User/AbouttheSplunkSupportingAdd-onforActiveDirectory&lt;/A&gt; to get a good background on how to do that.&lt;/P&gt;&lt;P&gt;2. Yes, this is possible. The easiest way to do this is probably just to separate the data into different indexes using the &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/9.1.2312/SearchReference/Collect" target="_blank" rel="noopener"&gt;collect &lt;/A&gt;command. Whatever data you want user1 to have, run a query for that data and collect to a certain index. Whatever data you want user2 to have, run a separate query to collect to a different index. There are other ways to do this as well, but that's the simplest I could think of.&lt;/P&gt;</description>
    <pubDate>Tue, 30 Apr 2024 12:23:02 GMT</pubDate>
    <dc:creator>kprior201</dc:creator>
    <dc:date>2024-04-30T12:23:02Z</dc:date>
    <item>
      <title>test AD environment</title>
      <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/685958#M17790</link>
      <description>&lt;P&gt;I have the following environment: 1 HF -&amp;gt; 1 indexer -&amp;gt; 1 SH , code 9.1&lt;/P&gt;&lt;P&gt;How do I onboard the AD controller data into my HF ? I am using&amp;nbsp;&lt;SPAN&gt;Add-on for Active Directory, any ldap commands? any recommendations ? is this the right tool ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 09:04:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/test-AD-environment/m-p/685958#M17790</guid>
      <dc:creator>stefani</dc:creator>
      <dc:date>2024-05-02T09:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access model in the test AD environment</title>
      <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/685961#M17791</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;1. You're on the right track. &lt;A href="https://splunkbase.splunk.com/app/1151" target="_blank"&gt;https://splunkbase.splunk.com/app/1151&lt;/A&gt; is what you need to be using. The documentation for this add-on has information about how the ldapsearch part works. You can run ldapsearch commands via the command line of wherever this is configured. If you're wanting to import certain ldap data, you'll need to create scheduled searches (on the HFW) to pull that data into Splunk. Read through &lt;A href="https://docs.splunk.com/Documentation/SA-LdapSearch/3.0.8/User/AbouttheSplunkSupportingAdd-onforActiveDirectory" target="_blank"&gt;https://docs.splunk.com/Documentation/SA-LdapSearch/3.0.8/User/AbouttheSplunkSupportingAdd-onforActiveDirectory&lt;/A&gt; to get a good background on how to do that.&lt;/P&gt;&lt;P&gt;2. Yes, this is possible. The easiest way to do this is probably just to separate the data into different indexes using the &lt;A href="https://docs.splunk.com/Documentation/SplunkCloud/9.1.2312/SearchReference/Collect" target="_blank" rel="noopener"&gt;collect &lt;/A&gt;command. Whatever data you want user1 to have, run a query for that data and collect to a certain index. Whatever data you want user2 to have, run a separate query to collect to a different index. There are other ways to do this as well, but that's the simplest I could think of.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Apr 2024 12:23:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/test-AD-environment/m-p/685961#M17791</guid>
      <dc:creator>kprior201</dc:creator>
      <dc:date>2024-04-30T12:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: test AD environment</title>
      <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686284#M17806</link>
      <description>&lt;P&gt;One more thing, how do I get this query : "| ldapsearch search="(objectClass=group)" attrs="*"&lt;BR /&gt;| collect index=&amp;lt;ldapsearch&amp;gt; "in my SH ?&lt;/P&gt;&lt;P&gt;I am following the tutorial ?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The following steps are the same for saving new alerts or editing existing alerts.&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;DIV class=""&gt;From the&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;Add Actions&lt;SPAN&gt;&amp;nbsp;menu, select&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;Log event.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;Add the following event information to configure the alert action. Use plain text or tokens for search, job, or server metadata.&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Event text&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Source and sourcetype&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Host&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;&lt;STRONG&gt;Destination index for the log event.&lt;SPAN&gt;&amp;nbsp;The&lt;SPAN&gt;&amp;nbsp;main&lt;SPAN&gt;&amp;nbsp;index is the default destination. You can specify a different existing index.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;DIV class=""&gt;How do I configure the event text to get the data in the SH ? all I get is some event like : " &lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;5/3/24&lt;BR /&gt;&lt;SPAN&gt;10:00:01.000 AM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;DIV class=""&gt;| &lt;SPAN class=""&gt;&lt;SPAN class=""&gt;ldapsearch &lt;SPAN class=""&gt;search="(&lt;SPAN class=""&gt;objectClass=group)" &lt;SPAN class=""&gt;attrs="*" | &lt;SPAN class=""&gt;collect &lt;SPAN class=""&gt;index=&amp;lt;&lt;SPAN class=""&gt;ldapsearch&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;DIV class=""&gt;&lt;UL class=""&gt;&lt;LI&gt;&lt;SPAN class=""&gt;host =&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;&lt;A class="" title="SBOXAD01.westpole.sb | SBOXAD02.westpole.sb" href="http://10.5.202.18:8000/en-US/app/search/search?q=search%20index%3D*%20index%3Dldapsearch&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;workload_pool=&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1714725017.649#" target="_blank" rel="noopener"&gt;SBOXAD01| SBOXAD02&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;source =&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;&lt;A class="" title="alert:" href="http://10.5.202.18:8000/en-US/app/search/search?q=search%20index%3D*%20index%3Dldapsearch&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;workload_pool=&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1714725017.649#" target="_blank" rel="noopener"&gt;alert:&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class=""&gt;sourcetype =&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;&lt;A class="" title="AD" href="http://10.5.202.18:8000/en-US/app/search/search?q=search%20index%3D*%20index%3Dldapsearch&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;workload_pool=&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1714725017.649#" target="_blank" rel="noopener"&gt;AD"&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 03 May 2024 08:31:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686284#M17806</guid>
      <dc:creator>stefani</dc:creator>
      <dc:date>2024-05-03T08:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: test AD environment</title>
      <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686296#M17807</link>
      <description>&lt;P&gt;I'm not sure I fully understand what's going on here. When you run the&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;|ldapsearch search="(objectClass=group)" attrs="*"
| collect index=&amp;lt;ldapsearch&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;command on your forwarder, do you get results or an error message? If you get results, then you should be able to simply search against the index on your search head. If you don't get results, then there's something else going on: is the app configured correctly? is the query correct?&lt;/P&gt;</description>
      <pubDate>Fri, 03 May 2024 11:35:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686296#M17807</guid>
      <dc:creator>kprior201</dc:creator>
      <dc:date>2024-05-03T11:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: test AD environment</title>
      <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686533#M17820</link>
      <description>&lt;P&gt;if I run the command on my HF is fine, it works. I configured the AD plugin to send events to the indexer. But if I run it on my SH doesn't work. I guess the send event function is not configured properly, by that I mean this tutorial :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The following steps are the same for saving new alerts or editing existing alerts.&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;DIV class=""&gt;From the&lt;SPAN&gt;&amp;nbsp;&lt;STRONG&gt;Add Actions&amp;nbsp;menu, select&amp;nbsp;Log event.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;Add the following event information to configure the alert action. Use plain text or tokens for search, job, or server metadata.&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Event text&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Source and sourcetype&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Host&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;STRONG&gt;Destination index for the log event.&lt;SPAN&gt;&amp;nbsp;The&amp;nbsp;main&amp;nbsp;index is the default destination. You can specify a different existing index.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 06 May 2024 08:43:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686533#M17820</guid>
      <dc:creator>stefani</dc:creator>
      <dc:date>2024-05-06T08:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: test AD environment</title>
      <link>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686618#M17827</link>
      <description>&lt;P&gt;It's possible that your SH isn't set up to reach your LDAP systems and that's why it's not returning results, but it's hard to say without more information. I'd recommend checking the logs for the add-on and seeing if you can find any errors or anything in there. You'll find these in $SPLUNK_HOME/var/log/splunk/SA-ldapsearch.log (Ref: &lt;A href="https://docs.splunk.com/Documentation/SA-LdapSearch/3.0.8/User/UseSA-ldapsearchtotroubleshootproblems" target="_blank" rel="noopener"&gt;https://docs.splunk.com/Documentation/SA-LdapSearch/3.0.8/User/UseSA-ldapsearchtotroubleshootproblems&lt;/A&gt;)&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 19:36:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/test-AD-environment/m-p/686618#M17827</guid>
      <dc:creator>kprior201</dc:creator>
      <dc:date>2024-05-06T19:36:56Z</dc:date>
    </item>
  </channel>
</rss>

