<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Find out who deleted a user in Linux in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/658059#M227303</link>
    <description>&lt;P&gt;Command history is logged in LOCAL7 facility, NOTICE level. &amp;nbsp;You may want to examine /etc/rsyslog.conf (and related conf files) to find out which log file(s) contain local7.notice.&lt;/P&gt;&lt;P&gt;According to&amp;nbsp;&lt;A href="https://github.com/rsyslog/rsyslog/blob/master/platform/redhat/rsyslog.conf" target="_blank"&gt;https://github.com/rsyslog/rsyslog/blob/master/platform/redhat/rsyslog.conf&lt;/A&gt;, RedHat default is to send local7.* into /var/log/boot.log. &amp;nbsp;But your system may have customized settings. &amp;nbsp;Normally, /var/log/secure is used for authpriv.*, thus it does not contain command history.&lt;/P&gt;&lt;P&gt;If the file that contains local7.notice is not ingested, you will need to ingest it.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Sep 2023 23:54:28 GMT</pubDate>
    <dc:creator>yuanliu</dc:creator>
    <dc:date>2023-09-19T23:54:28Z</dc:date>
    <item>
      <title>How to find out who deleted a user in Linux?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/657700#M227156</link>
      <description>&lt;P&gt;Hi All, just wondering if anyone has a search that shows which user deleted another user in Linux&amp;nbsp; ?&lt;BR /&gt;&lt;BR /&gt;Typically in the linux syslog messages, when we check for &lt;STRONG&gt;userdel&lt;/STRONG&gt; messages ,&amp;nbsp; it only shows the name of the user account that was deleted.&amp;nbsp; There isn't any mention of which user performed this action.&amp;nbsp;&lt;BR /&gt;&amp;nbsp;Whereas in Windows events, we see both src and target user for deletion Event IDs.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;How to get this info ? I know one can manually login to host and verify the ./bash_history but how do you accomplish this from Splunk itself ?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 22:02:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/657700#M227156</guid>
      <dc:creator>neerajs_81</dc:creator>
      <dc:date>2023-09-18T22:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Find out who deleted a user in Linux</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/657852#M227228</link>
      <description>&lt;P&gt;You need to read up Linux user management, or ask your SysAdmin how to determine such matters.&lt;/P&gt;&lt;P&gt;Understandably, Windows user management is totally different Unix and Linux user management. &amp;nbsp;Unless your system uses some uncommon admin overlay (which only your SysAdmin can tell you), userdel command can only be executed by root (uid 0). &amp;nbsp;A non-root user may have sudo privileges to execute commands as root, but this can only be executed as &lt;FONT face="andale mono,times"&gt;sudo usserdel&lt;/FONT&gt;. &amp;nbsp;Alternatively, if unprivileged user is allowed root shell, such a user can first use &lt;FONT face="andale mono,times"&gt;sudo su &amp;lt;shell name&amp;gt;&lt;/FONT&gt; to gain a root shell, then execute userdel in this shell as if it is user root.&lt;/P&gt;&lt;P&gt;Most modern Linux systems log full command history.&amp;nbsp; You didn't say which Linux OS you are using. &amp;nbsp;You say "(syslog)&amp;nbsp;&lt;SPAN&gt;only shows the name of the user account that was deleted," but without any context like which source file are you looking at.&lt;/SPAN&gt;&amp;nbsp; In Unix-like systems, "syslog" is a OS facility that can be organized in many different ways, i.e., various messages (events) can go to various places. (If you are unsure, ask your SysAdmin.) &amp;nbsp;You didn't even illustrate a sample log entry. (You can always anonymize; but make sure to preserve formatting and other characteristics.)&amp;nbsp; Volunteers cannot possibly help with all these ambiguities.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 07:38:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/657852#M227228</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-09-18T07:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Find out who deleted a user in Linux</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/657876#M227236</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am myself a sysadmin and&amp;nbsp; if you read my entire post with open eyes ,&amp;nbsp; i myself wrote that this information is available in /bash_history to check but that is manually after ssh into the server. If i wasn't aware how to check this, i wouldn't have mentioned about checking user's history.&lt;BR /&gt;&lt;BR /&gt;It doesn't matter which ever flavor of Linux you take be it Ubuntu or RHEL family anybody who is familiar with user deletion activity will know this issue because its same for any linux flavor.&lt;BR /&gt;&lt;BR /&gt;We are on RHEL 7.9 and under&amp;nbsp;&lt;SPAN&gt;/var/log/secure&amp;nbsp; all we see is following type of messages when someone runs userdel command:&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="neerajs_81_0-1695035795460.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/27224i8CEC58E3AC198016/image-size/medium?v=v2&amp;amp;px=400" role="button" title="neerajs_81_0-1695035795460.png" alt="neerajs_81_0-1695035795460.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;There is no further message or record in /var/log/secure of who ran this command. That's my use case and that is why i drew parallel with Windows Event Viewer logs to see how others are doing for similar use cases.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 11:21:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/657876#M227236</guid>
      <dc:creator>neerajs_81</dc:creator>
      <dc:date>2023-09-18T11:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Find out who deleted a user in Linux</title>
      <link>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/658059#M227303</link>
      <description>&lt;P&gt;Command history is logged in LOCAL7 facility, NOTICE level. &amp;nbsp;You may want to examine /etc/rsyslog.conf (and related conf files) to find out which log file(s) contain local7.notice.&lt;/P&gt;&lt;P&gt;According to&amp;nbsp;&lt;A href="https://github.com/rsyslog/rsyslog/blob/master/platform/redhat/rsyslog.conf" target="_blank"&gt;https://github.com/rsyslog/rsyslog/blob/master/platform/redhat/rsyslog.conf&lt;/A&gt;, RedHat default is to send local7.* into /var/log/boot.log. &amp;nbsp;But your system may have customized settings. &amp;nbsp;Normally, /var/log/secure is used for authpriv.*, thus it does not contain command history.&lt;/P&gt;&lt;P&gt;If the file that contains local7.notice is not ingested, you will need to ingest it.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 23:54:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/How-to-find-out-who-deleted-a-user-in-Linux/m-p/658059#M227303</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2023-09-19T23:54:28Z</dc:date>
    </item>
  </channel>
</rss>

