<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Audit splunk in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489002#M194037</link>
    <description>&lt;P&gt;It is unclear for me why there isn't any easy and comfortable way to search all the objects that have been changed on Splunk. &lt;/P&gt;

&lt;P&gt;It is very basic and this that admins need, in order to be in control over the environment.&lt;/P&gt;

&lt;P&gt;I have this query, that i find on an answer here, and added some changes: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal (sourcetype=splunkd_ui_access OR sourcetype=splunkd_access)
    ( method=POST OR method=DELETE)
    ( user!=splunk-system-user user!=- )
    ( uri_path=/servicesNS/* OR uri_path=/en-US/splunkd/__raw/servicesNS/* uri_path!="*/user-prefs/*" uri_path!="/servicesNS/*/*/*/jobs/*/control" uri_path!="/servicesNS/*/mobile_access*" uri_path!="*/ui/prefs*" uri_path!="/en-US/splunkd/__raw/servicesNS/*/*/*/jobs/*/control" uri_path!="/en-US/splunkd/__raw/servicesNS/*/*/*/ui/ui-tour*") 
| replace "*/ui/views*" with "*/ui_views*", "*/props*" with "**", "*/distributed/peers*" with "*/distributed_peers*", "*/server/serverclasses*" with "*/server_class*" in uri_path 
| replace "/en-US/splunkd/__raw*" with "*" in uri_path
| where mvcount( split( uri_path , "/" ) ) &amp;gt; 6 
| eval activity = case( method=="POST" AND like( uri_path , "%/acl" ) , "Permissions Update", method=="POST" AND NOT like( uri_path , "%/acl" ) , "Edited" , method="DELETE" , "Deleted" ) 
| rex field=uri_path "/servicesNS(/[^\/]+){3}/(?&amp;lt;object_type&amp;gt;[^\/]+)/(?&amp;lt;object_name&amp;gt;[^\/]+)" 
| eval object_name = urldecode( object_name ) 
| convert ctime(_time) timeformat="%m/%d/%Y %H:%M:%S" 
| table _time, user, object_name, object_type, activity
| dedup _time, user, object_name​
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But it is not quite good, as there seem to be a lot of false positive stats. &lt;/P&gt;

&lt;P&gt;Can someone please help me accomplish this? &lt;/P&gt;

&lt;P&gt;*** I am not familiar with the fields of the internal logs and i couldn't find any description or details about it, so it can be useful too.&lt;/P&gt;

&lt;P&gt;Also, is there any difference in the logs between Splunk cloud and splunk enterprise ? &lt;/P&gt;

&lt;P&gt;Thanks ! &lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2019 14:33:33 GMT</pubDate>
    <dc:creator>astatrial</dc:creator>
    <dc:date>2019-09-23T14:33:33Z</dc:date>
    <item>
      <title>Audit splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489002#M194037</link>
      <description>&lt;P&gt;It is unclear for me why there isn't any easy and comfortable way to search all the objects that have been changed on Splunk. &lt;/P&gt;

&lt;P&gt;It is very basic and this that admins need, in order to be in control over the environment.&lt;/P&gt;

&lt;P&gt;I have this query, that i find on an answer here, and added some changes: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_internal (sourcetype=splunkd_ui_access OR sourcetype=splunkd_access)
    ( method=POST OR method=DELETE)
    ( user!=splunk-system-user user!=- )
    ( uri_path=/servicesNS/* OR uri_path=/en-US/splunkd/__raw/servicesNS/* uri_path!="*/user-prefs/*" uri_path!="/servicesNS/*/*/*/jobs/*/control" uri_path!="/servicesNS/*/mobile_access*" uri_path!="*/ui/prefs*" uri_path!="/en-US/splunkd/__raw/servicesNS/*/*/*/jobs/*/control" uri_path!="/en-US/splunkd/__raw/servicesNS/*/*/*/ui/ui-tour*") 
| replace "*/ui/views*" with "*/ui_views*", "*/props*" with "**", "*/distributed/peers*" with "*/distributed_peers*", "*/server/serverclasses*" with "*/server_class*" in uri_path 
| replace "/en-US/splunkd/__raw*" with "*" in uri_path
| where mvcount( split( uri_path , "/" ) ) &amp;gt; 6 
| eval activity = case( method=="POST" AND like( uri_path , "%/acl" ) , "Permissions Update", method=="POST" AND NOT like( uri_path , "%/acl" ) , "Edited" , method="DELETE" , "Deleted" ) 
| rex field=uri_path "/servicesNS(/[^\/]+){3}/(?&amp;lt;object_type&amp;gt;[^\/]+)/(?&amp;lt;object_name&amp;gt;[^\/]+)" 
| eval object_name = urldecode( object_name ) 
| convert ctime(_time) timeformat="%m/%d/%Y %H:%M:%S" 
| table _time, user, object_name, object_type, activity
| dedup _time, user, object_name​
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But it is not quite good, as there seem to be a lot of false positive stats. &lt;/P&gt;

&lt;P&gt;Can someone please help me accomplish this? &lt;/P&gt;

&lt;P&gt;*** I am not familiar with the fields of the internal logs and i couldn't find any description or details about it, so it can be useful too.&lt;/P&gt;

&lt;P&gt;Also, is there any difference in the logs between Splunk cloud and splunk enterprise ? &lt;/P&gt;

&lt;P&gt;Thanks ! &lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 14:33:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489002#M194037</guid>
      <dc:creator>astatrial</dc:creator>
      <dc:date>2019-09-23T14:33:33Z</dc:date>
    </item>
    <item>
      <title>Re: Audit splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489003#M194038</link>
      <description>&lt;P&gt;Hi @astatrial,&lt;/P&gt;

&lt;P&gt;Try this for a base search to get the list of actions for any changes, you can then filter on specific objects or actions :&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=_audit action=*edit* OR action=*create* OR action=*delete* OR action=*change*| stats count by user, action
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;As for "Also, is there any difference in the logs between Splunk cloud and splunk enterprise ?" the answer is no. The internal log structure remains the same.&lt;/P&gt;

&lt;P&gt;Cheers,&lt;BR /&gt;
David&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2019 14:39:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489003#M194038</guid>
      <dc:creator>DavidHourani</dc:creator>
      <dc:date>2019-09-23T14:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: Audit splunk</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489004#M194039</link>
      <description>&lt;P&gt;Hi David, &lt;BR /&gt;
Thanks for your response.&lt;BR /&gt;
I already tried using the _audit index but it seems to have a lot of irrelevant events too, and in addition it doesn't contain some actions (for example, i created a report and search for the event in _audit and it wasn't there by the name of the search). &lt;/P&gt;

&lt;P&gt;The actions that i am looking for are on objects like (reports, alerts, indexes, lookups, DM, correlation searches, sourcetypes, etc..)&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 06:54:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Audit-splunk/m-p/489004#M194039</guid>
      <dc:creator>astatrial</dc:creator>
      <dc:date>2019-09-24T06:54:32Z</dc:date>
    </item>
  </channel>
</rss>

