<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450936#M127698</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/1406"&gt;@woodcock&lt;/a&gt; &lt;BR /&gt;
Thanks. I know they are bundles of configuration files. To senior management, they are software not developed by us, supported by us, or supported by any of our approved vendors.&lt;BR /&gt;
Having said that, we will look at installing these on our test instance and extract the necessary rex/regex statements. Our test instance is also used for developing SPL and XML for the user community. Replacing the Splunk_TA_nix app may cause some issues with them.&lt;BR /&gt;
I was hoping there was an available source (such as Go.Splunk) that would have this code and that I would be able to tweak for our purposes.&lt;/P&gt;

&lt;P&gt;I have started down the SPL path myself and to append all three of these log files into one table is a bear, because there is no one field that exists in all events. Not only within all three logs, but within each log itself. Small wonder why Splunk hasn't been able to develop a useful Linux app, like they did with the Splunk App for Windows Infrastructure.&lt;/P&gt;

&lt;P&gt;Thanks again for your help. I will create a new post with my findings.&lt;/P&gt;

&lt;P&gt;Enjoy your weekend and God bless,&lt;BR /&gt;
Genesius&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:47:14 GMT</pubDate>
    <dc:creator>genesiusj</dc:creator>
    <dc:date>2020-09-30T01:47:14Z</dc:date>
    <item>
      <title>Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450931#M127693</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;
I am working on dashboard for our Linux admins. They require being able to view all events from &lt;STRONG&gt;/var/log/sudo.log&lt;/STRONG&gt;, &lt;STRONG&gt;/var/log/secure&lt;/STRONG&gt; and &lt;STRONG&gt;/var/log/audit/audit.log&lt;/STRONG&gt; for a single user on a single host.&lt;/P&gt;

&lt;P&gt;I am not well-versed in Linux and I am having difficulty creating the proper &lt;EM&gt;rex&lt;/EM&gt; commands for my &lt;EM&gt;SPL&lt;/EM&gt;.&lt;/P&gt;

&lt;P&gt;For example, here is an event from the /var/log/secure.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Aug  1 13:33:59 server10 groupadd[51032]: group added to /etc/gshadow: name=splunk
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;How I can find out which user added this group? I believe I could group by the &lt;STRONG&gt;PID&lt;/STRONG&gt;. But then I would have to track every &lt;STRONG&gt;PID&lt;/STRONG&gt; that is spawned off of the original and subsequent &lt;STRONG&gt;PIDs&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;Before I delve down this very complex path, has anyone worked on this idea before? Would you mind sharing your SPL for this?&lt;/P&gt;

&lt;P&gt;Thanks in advance and God bless,&lt;BR /&gt;
Genesius&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 19:47:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450931#M127693</guid>
      <dc:creator>genesiusj</dc:creator>
      <dc:date>2019-08-14T19:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450932#M127694</link>
      <description>&lt;P&gt;You do not need to do all of this yourself.  Try this app:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/3476/"&gt;https://splunkbase.splunk.com/app/3476/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2019 21:08:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450932#M127694</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-08-15T21:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450933#M127695</link>
      <description>&lt;P&gt;@woodcock &lt;BR /&gt;
I am not sure if we will be able to use these, except in our test instance. We have a policy; no software can be installed in production unless it is supported by the vendor. Even though this is Splunk AppInspect Passed, it is not supported by Splunk, or a known third party, we won't install in production.&lt;BR /&gt;
Thanks for your help.&lt;BR /&gt;
Enjoy your weekend.&lt;BR /&gt;
God bless,&lt;BR /&gt;
Genesius&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 12:06:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450933#M127695</guid>
      <dc:creator>genesiusj</dc:creator>
      <dc:date>2019-08-16T12:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450934#M127696</link>
      <description>&lt;P&gt;Here is a post with some potentially helpful information: &lt;A href="https://answers.splunk.com/answers/339024/splunk-app-for-unix-and-linux-how-to-extract-user.html"&gt;Splunk App for Unix and Linux: How to extract user field from /var/log/secure?&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 12:18:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450934#M127696</guid>
      <dc:creator>jpolvino</dc:creator>
      <dc:date>2019-08-16T12:18:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450935#M127697</link>
      <description>&lt;P&gt;First of all, most Splunk apps, including this one, are not software; they are bundles of configuration files.  Second, a sensible approach for apps such as this one (especially with open-source licenses) would be to download the app, open it up, and rip out the configurations that you need and deploy them outside of the app.  We are only talking about RegEx definitions in this case.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 14:05:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450935#M127697</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-08-16T14:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450936#M127698</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/1406"&gt;@woodcock&lt;/a&gt; &lt;BR /&gt;
Thanks. I know they are bundles of configuration files. To senior management, they are software not developed by us, supported by us, or supported by any of our approved vendors.&lt;BR /&gt;
Having said that, we will look at installing these on our test instance and extract the necessary rex/regex statements. Our test instance is also used for developing SPL and XML for the user community. Replacing the Splunk_TA_nix app may cause some issues with them.&lt;BR /&gt;
I was hoping there was an available source (such as Go.Splunk) that would have this code and that I would be able to tweak for our purposes.&lt;/P&gt;

&lt;P&gt;I have started down the SPL path myself and to append all three of these log files into one table is a bear, because there is no one field that exists in all events. Not only within all three logs, but within each log itself. Small wonder why Splunk hasn't been able to develop a useful Linux app, like they did with the Splunk App for Windows Infrastructure.&lt;/P&gt;

&lt;P&gt;Thanks again for your help. I will create a new post with my findings.&lt;/P&gt;

&lt;P&gt;Enjoy your weekend and God bless,&lt;BR /&gt;
Genesius&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:47:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450936#M127698</guid>
      <dc:creator>genesiusj</dc:creator>
      <dc:date>2020-09-30T01:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450937#M127699</link>
      <description>&lt;P&gt;Go.Splunk is just a collection of community provided Splunk queries. Why is that more supported than something from apps.splunk.com? The suggested app is written by Doug Brown who works for RedHat - if anyone can write an app to interpret Linux logs, I'd expect it to be a RedHat employee!&lt;/P&gt;</description>
      <pubDate>Sat, 17 Aug 2019 02:49:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450937#M127699</guid>
      <dc:creator>vliggio</dc:creator>
      <dc:date>2019-08-17T02:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450938#M127700</link>
      <description>&lt;P&gt;If it is written by a RedHat employee than RedHat should look into supporting it.&lt;BR /&gt;
Getting into the "whys" of my organization's policies isn't really the direction I want to go. If someone has some information to assist with the issue I posted, great.&lt;BR /&gt;
I don't write policy, I follow policy.&lt;/P&gt;

&lt;P&gt;Update: I have started down the path to joining these logs together, and it has been an education. I will share more once I am done.&lt;/P&gt;

&lt;P&gt;Thanks and God bless,&lt;BR /&gt;
Genesius&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2019 20:56:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/450938#M127700</guid>
      <dc:creator>genesiusj</dc:creator>
      <dc:date>2019-08-21T20:56:42Z</dc:date>
    </item>
    <item>
      <title>Re: Dashboard with /var/log/sudo.log, /var/log/secure and /var/log/audit/audit.log Events</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/539073#M152468</link>
      <description>&lt;P&gt;Could you update us on the dashboard?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 23:42:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Dashboard-with-var-log-sudo-log-var-log-secure-and-var-log-audit/m-p/539073#M152468</guid>
      <dc:creator>youngsuh</dc:creator>
      <dc:date>2021-02-08T23:42:56Z</dc:date>
    </item>
  </channel>
</rss>

