All Apps and Add-ons

admonEventType="deleted" not tagged with 'change'

simonsigre
Path Finder

I have noted events such as

index=* sourcetype=ActiveDirectory admonEventType="deleted" OR admonEventType="updated"

Does not have an eventtype set that applies the appropriate tags to have it comply with

https://docs.splunk.com/Documentation/CIM/4.11.0/User/ChangeAnalysis

Even though this is flagged as being CIM compliant, would be great if these where added, or, the project Git repo be made available as to allow contributions

simonsigre
Path Finder

@shogan_splunk any updates on the GitHub access?

0 Karma

simonsigre
Path Finder

Thanks @shogan_splunk appreciate the update and look forward to getting access to repo .
Also, props (not a Splunk joke) to forum handle.

0 Karma

shogan_splunk
Splunk Employee
Splunk Employee

Simon,
I am working on a major update, with the main part using the kv store, along with other minor fixes/enhancements. I will split off a minor update to include the missing CIM tags as well as the planned minor fixes and Windows TA v5 + support.
As far as github, I will place it there and update this answer with a link.
Thanks for the feedback,
Steve

0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...