Getting Data In

Splunk Self Monitoring

I_am_Jeff
Communicator

My security people have asked if there is a self-monitoring capability in Splunk to track situations such as

  • A disgruntled employee does something and tries to cover his track by
    modifying the log file and the Splunk index, either by editing or removal.
Tags (1)
1 Solution

jbsplunk
Splunk Employee
Splunk Employee

By default Splunk monitors changes to $SPLUNK_HOME/etc/. Changes to the index and log files are probably best tracked with operating system level changes. You could use fschange, but it is deprecated and as such, won't be around forever.

http://docs.splunk.com/Documentation/Splunk/latest/Data/FSChangelocal

However, in my opinion, operating system level tools(auditd) are preferable to something like fschange.

View solution in original post

jbsplunk
Splunk Employee
Splunk Employee

By default Splunk monitors changes to $SPLUNK_HOME/etc/. Changes to the index and log files are probably best tracked with operating system level changes. You could use fschange, but it is deprecated and as such, won't be around forever.

http://docs.splunk.com/Documentation/Splunk/latest/Data/FSChangelocal

However, in my opinion, operating system level tools(auditd) are preferable to something like fschange.

View solution in original post

I_am_Jeff
Communicator

HOWEVER, our security team did like event hashing.

http://docs.splunk.com/Documentation/Splunk/4.3.4/Admin/Eventhashing

0 Karma

I_am_Jeff
Communicator

Yup. I knew about fschange going away. And it's always difficult to have the watcher watch itself in a meaningful and trusted way. Thank you for your comments!

0 Karma
Did you miss .conf21 Virtual?

Good news! The event's keynotes and many of its breakout sessions are now available online, and still totally FREE!