<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A splunk query to fetch Admin activity inside splunk in Security</title>
    <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710923#M18335</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/270540"&gt;@Zorghost&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;It isn't so clear because you have th same information available on Splunk and in dynamic way instead in static way on the share.&lt;/P&gt;&lt;P&gt;Anyway, you have to define a search to extract only the fields you need, not all the full events; in this way, you'll reduct so much the number of data to extract.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
    <pubDate>Fri, 07 Feb 2025 14:15:13 GMT</pubDate>
    <dc:creator>gcusello</dc:creator>
    <dc:date>2025-02-07T14:15:13Z</dc:date>
    <item>
      <title>A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710917#M18332</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I am planning to automate a process where we need to archive admin activity for splunk application.&lt;/P&gt;&lt;P&gt;For that I would require a query to fetch all the privileged actions conducted by admins inside splunk application. My first thought is to use the following query:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;index=_audit sourcetype="audittrial" action=edit* OR action=create* OR action=delete* OR action=restart*&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, this query is emitting a lot of data ( around 900MB per day ) which the platform that I am using for automation can´t work with.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;=&amp;gt; Is there maybe any query that I can use to get the data I need in a more specific way to the point where it reduces the size to 20 MB or something ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I would appreciate any help and thank you in advance !&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 13:10:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710917#M18332</guid>
      <dc:creator>Zorghost</dc:creator>
      <dc:date>2025-02-07T13:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710919#M18333</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/270540"&gt;@Zorghost&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;sorry but it isn't clear for me what do you want to do:&lt;/P&gt;&lt;P&gt;what do you mean with "archive"?&lt;/P&gt;&lt;P&gt;Splunk audit logs are in the index _audit that by default is maintained fro 6 years.&lt;/P&gt;&lt;P&gt;In addition I don't understand what do you mea with 900 MB/day, maybe do you extract these data? why?&lt;/P&gt;&lt;P&gt;Anyway, you could group data that are relevant for you and extract only them.&lt;/P&gt;&lt;P&gt;If you want, you could extract grouped data in a summary index and store in that index these data.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 13:17:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710919#M18333</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-02-07T13:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710920#M18334</link>
      <description>&lt;P&gt;Thank you for the reply&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I want to extract the data from that index -&amp;gt; process it -&amp;gt; send it to a file share.&lt;/P&gt;&lt;P&gt;The issue is that I can´t work with data that is more than 20 MB in the platform that I am using to automate this process. Therefore, I m looking for a more specific query to get smaller size data.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 13:32:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710920#M18334</guid>
      <dc:creator>Zorghost</dc:creator>
      <dc:date>2025-02-07T13:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710923#M18335</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/270540"&gt;@Zorghost&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;It isn't so clear because you have th same information available on Splunk and in dynamic way instead in static way on the share.&lt;/P&gt;&lt;P&gt;Anyway, you have to define a search to extract only the fields you need, not all the full events; in this way, you'll reduct so much the number of data to extract.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2025 14:15:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/710923#M18335</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-02-07T14:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711236#M18348</link>
      <description>&lt;P&gt;Thank you again for the support&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I currently don´t have visibility on _audit index in splunk. Do you maybe know if it is possible as well to filter the data based on the user type ? like for example : user=admin ? what other users in splunk would exist with administrative privileges as well ?&lt;/P&gt;&lt;P&gt;Are there any standard fields that exist in the _audit index that you think are enough to be archived while delivering the important details of the audit event ?&lt;/P&gt;&lt;P&gt;I would really appreciate any help !&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 07:39:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711236#M18348</guid>
      <dc:creator>Zorghost</dc:creator>
      <dc:date>2025-02-11T07:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711264#M18349</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/270540"&gt;@Zorghost&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;let me understand: you need to access _audit index but you aren't anabled to it and you would have a copy of these logs accessible for you, is it correct?&lt;/P&gt;&lt;P&gt;If this is your requirement, the easiest way is obviously to be enabled to access _audit index!&lt;/P&gt;&lt;P&gt;Otherwise, you could schedule a search (having the administrative grants) that copies the _audit index in a summary index, so you can access it in Splunk.&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 13:11:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711264#M18349</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-02-11T13:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711267#M18350</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;and thanks again for your reply !&lt;/P&gt;&lt;P&gt;What I want is a query that I can use to fetch only the important fields from the _audit index to get visibility on the admin activity events. What I currently have is :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;index=_audit sourcetype="audittrial" action=edit* OR action=create* OR action=delete* OR action=restart*&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I want to get the least possible amount of data volume while getting the needed information to construct the audit events.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 13:31:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711267#M18350</guid>
      <dc:creator>Zorghost</dc:creator>
      <dc:date>2025-02-11T13:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: A splunk query to fetch Admin activity inside splunk</title>
      <link>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711269#M18351</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/270540"&gt;@Zorghost&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;at first, there's a mistyping error:&lt;/P&gt;&lt;P&gt;not auditrial but audittrail&lt;/P&gt;&lt;P&gt;Then analyzing the results of your search I see seom interesting fields:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;_time&lt;/LI&gt;&lt;LI&gt;use&lt;/LI&gt;&lt;LI&gt;dest&lt;/LI&gt;&lt;LI&gt;action&lt;/LI&gt;&lt;LI&gt;info&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;But I don't think that you need external help for this!&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Tue, 11 Feb 2025 13:41:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/A-splunk-query-to-fetch-Admin-activity-inside-splunk/m-p/711269#M18351</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2025-02-11T13:41:56Z</dc:date>
    </item>
  </channel>
</rss>

