Reporting

How to set up a scheduled search that looks for the usage of the delete command in my environment?

jward6004
Explorer

I want to set up a scheduled search that will look for the usage of the delete command in my environment.

This action is secured by the can_delete user role currently.

0 Karma

inventsekar
SplunkTrust
SplunkTrust

This search will show you if anyone has run the delete command .. you can save this as a scheduled search..

index=_audit sourcetype=audittrail action=search search=*delete* 
 | where match(search,"\|\s*delete")
 | table _time search user
thanks and best regards,
Sekar

PS - If this or any post helped you in any way, pls consider upvoting, thanks for reading !
0 Karma

sundareshr
Legend

Set you alert to this query. If count>0, alert

index=_audit sourcetype=audittrail delete | regex _raw="\|\s*delete" 
0 Karma
Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...