<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Seeking assistance on configuring the indexer for Linux Logs in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635500#M108735</link>
    <description>&lt;P&gt;There are several user's who use the search head but I'm the only one making configuration changes to the indexer.&amp;nbsp; As it stands I can see tons of data but am having trouble pulling very specific fields such as filepath, filename, or the names of objects affected by user modification.&amp;nbsp; I'll take a look at auditd and see what I can find.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 22 Mar 2023 14:09:30 GMT</pubDate>
    <dc:creator>kymenope</dc:creator>
    <dc:date>2023-03-22T14:09:30Z</dc:date>
    <item>
      <title>How to configure the indexer for Linux Logs?</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635357#M108717</link>
      <description>&lt;P&gt;I am attempting to audit the usage of commands such as chown or chomod on my linux environment.&amp;nbsp; Through the below query I am able to see the list of user's, hosts, and the commands that were run but not the files or directories that they were run on.&amp;nbsp; There are no fields in the event viewer that show filepaths or directories of any kind.&lt;/P&gt;
&lt;P&gt;index=myindex&amp;nbsp; comm="chmod"&amp;nbsp; | table date , host , AUID , comm , exe , source&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any assistance would be appreciated.&amp;nbsp; Pretty new to Splunk&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 20:17:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635357#M108717</guid>
      <dc:creator>kymenope</dc:creator>
      <dc:date>2023-03-22T20:17:56Z</dc:date>
    </item>
    <item>
      <title>Re: Seeking assistance on configuring the indexer for Linux Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635379#M108718</link>
      <description>&lt;P&gt;I suppose you're talking about data from linux audit logs. It's not as much about ingesting data into Splunk as such but more about making auditd report them in the first place. And that's a huuuuuuge topic. You can log quite a lot with auditd but of course the more you raise verbosity of your logs, the more burden you put on your system both in performance penalty of logging everything as well as storage use.&lt;/P&gt;&lt;P&gt;Since it's a very non Splunk-specific topic I'd suggest starting with &lt;A href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/chap-system_auditing" target="_blank"&gt;https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/chap-system_auditing&lt;/A&gt; - it's a relatively comprehensive guide to auditd.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2023 18:27:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635379#M108718</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-03-21T18:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Seeking assistance on configuring the indexer for Linux Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635383#M108719</link>
      <description>&lt;P&gt;That is exactly what I am referencing.&amp;nbsp; In the inputs.conf I am monitoring several /var/log locations on my linux indexer but am still not seeing the results I am hoping to see.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Mar 2023 18:52:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635383#M108719</guid>
      <dc:creator>kymenope</dc:creator>
      <dc:date>2023-03-21T18:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: Seeking assistance on configuring the indexer for Linux Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635465#M108727</link>
      <description>&lt;P&gt;1. "Monitoring several /var/log locations" will surely give you several different types of logs. Not only audit logs but a whole bunch of other stuff.&lt;/P&gt;&lt;P&gt;2. Just because you add more monitored files to your forwarder doesn't mean that your OS logs what you need.&lt;/P&gt;&lt;P&gt;3. Are you sure you want to monitor _your indexer_? Are other users working directly on your indexer?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 08:20:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635465#M108727</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-03-22T08:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: Seeking assistance on configuring the indexer for Linux Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635500#M108735</link>
      <description>&lt;P&gt;There are several user's who use the search head but I'm the only one making configuration changes to the indexer.&amp;nbsp; As it stands I can see tons of data but am having trouble pulling very specific fields such as filepath, filename, or the names of objects affected by user modification.&amp;nbsp; I'll take a look at auditd and see what I can find.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 14:09:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635500#M108735</guid>
      <dc:creator>kymenope</dc:creator>
      <dc:date>2023-03-22T14:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Seeking assistance on configuring the indexer for Linux Logs</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635502#M108737</link>
      <description>&lt;P&gt;No, of course people use the search head as per splunk service.&lt;/P&gt;&lt;P&gt;I meant working directly on the server - logging in via ssh and stuff flike that. Your users do that on the search-head? Or on the indexer???&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 14:37:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-configure-the-indexer-for-Linux-Logs/m-p/635502#M108737</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2023-03-22T14:37:17Z</dc:date>
    </item>
  </channel>
</rss>

