<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Linux mounting/unmounting in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384708#M112360</link>
    <description>&lt;P&gt;What you need to do is perform some stimulus response testing and development.  &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;ask the admin what linux distro and version they are running&lt;/LI&gt;
&lt;LI&gt;setup a vm for the distro and install a universal forwarder on it&lt;/LI&gt;
&lt;LI&gt;forward the logs to splunk enterprise (can be local install to your laptop/workstation where the vm is or wherever you have a splunk enterprise instance available for this dev work)&lt;/LI&gt;
&lt;LI&gt;perform the actions you want to write and alert for - plug in usbs, mount cds, etc&lt;/LI&gt;
&lt;LI&gt;look at the raw logs and write your alerts, during your analysis you might be able to generalize the alert such that it can be applied to more than one linux distro (would still require testing and validation)&lt;/LI&gt;
&lt;LI&gt;perhaps install the *nix app/ta to get some quick win parsing before starting the log analysis&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;You might also try the splunk security essentials app on splunk base, it might have some of this built already and you could just copy the searches, you would still likely benefit from testing it against a vm with proper disto.&lt;/P&gt;</description>
    <pubDate>Wed, 22 May 2019 22:22:26 GMT</pubDate>
    <dc:creator>marycordova</dc:creator>
    <dc:date>2019-05-22T22:22:26Z</dc:date>
    <item>
      <title>Linux mounting/unmounting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384705#M112357</link>
      <description>&lt;P&gt;I am attempting to create a search string for a Linux box which involves mounting/unmounting removable media devices (ie., CDs and USB devices) Any help would be welcome.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 14:39:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384705#M112357</guid>
      <dc:creator>mvitullo</dc:creator>
      <dc:date>2019-05-22T14:39:23Z</dc:date>
    </item>
    <item>
      <title>Re: Linux mounting/unmounting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384706#M112358</link>
      <description>&lt;P&gt;It's not clear what you seek.  Please explain your use case.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 14:45:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384706#M112358</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-05-22T14:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Linux mounting/unmounting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384707#M112359</link>
      <description>&lt;P&gt;I have a system admininistrator who requires a dashboard for their Linux OS. This dashboard is to be used for providing when any users place (mount) and/or remove (unmount) any form of removable media from the machine. The search string would look for any events where this would occur.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 15:05:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384707#M112359</guid>
      <dc:creator>mvitullo</dc:creator>
      <dc:date>2019-05-22T15:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: Linux mounting/unmounting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384708#M112360</link>
      <description>&lt;P&gt;What you need to do is perform some stimulus response testing and development.  &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;ask the admin what linux distro and version they are running&lt;/LI&gt;
&lt;LI&gt;setup a vm for the distro and install a universal forwarder on it&lt;/LI&gt;
&lt;LI&gt;forward the logs to splunk enterprise (can be local install to your laptop/workstation where the vm is or wherever you have a splunk enterprise instance available for this dev work)&lt;/LI&gt;
&lt;LI&gt;perform the actions you want to write and alert for - plug in usbs, mount cds, etc&lt;/LI&gt;
&lt;LI&gt;look at the raw logs and write your alerts, during your analysis you might be able to generalize the alert such that it can be applied to more than one linux distro (would still require testing and validation)&lt;/LI&gt;
&lt;LI&gt;perhaps install the *nix app/ta to get some quick win parsing before starting the log analysis&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;You might also try the splunk security essentials app on splunk base, it might have some of this built already and you could just copy the searches, you would still likely benefit from testing it against a vm with proper disto.&lt;/P&gt;</description>
      <pubDate>Wed, 22 May 2019 22:22:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384708#M112360</guid>
      <dc:creator>marycordova</dc:creator>
      <dc:date>2019-05-22T22:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Linux mounting/unmounting</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384709#M112361</link>
      <description>&lt;P&gt;Couple questions up front:&lt;BR /&gt;
1. Do you already collect logs on these linux systems?&lt;BR /&gt;
2. Are you forwarding these logs into splunk already?&lt;BR /&gt;
3. What variations of Linux are you looking to report against?&lt;/P&gt;</description>
      <pubDate>Thu, 23 May 2019 15:39:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Linux-mounting-unmounting/m-p/384709#M112361</guid>
      <dc:creator>mlinde</dc:creator>
      <dc:date>2019-05-23T15:39:08Z</dc:date>
    </item>
  </channel>
</rss>

