Splunk Enterprise Security

Authentication extraction for Unix add-on and Enterprise Security (tested un Ubuntu Linux)

mdessus_splunk
Splunk Employee
Splunk Employee

For the ones who use the Unix addon for extracting authentication events for Enterprise Security, and some events are not recognized, mainly on Ubuntu Linux (not tested on other distribs), here's the one I've added. Feel free to correct/complement them.

To be added in etc/apps/Splunk_TA_nix/local/props.conf:

[source::/var/log/auth.log]
EXTRACT-app_and_dest = ^\w+ +\d+ \d\d:\d\d:\d\d (?<dest>\w+) (?<app>\S+)\[\d+\]
EXTRACT-ssh_details = (?<vendor_action>Failed|Accepted) \w+ for (invalid user )*(?<user>\S+) from (?<src>\d+\.\d+\.\d+\.\d+) port (?<src_port>\d+)
EXTRACT-sudo_open_details = ^\w+ +\d+ \d\d:\d\d:\d\d \w+ (?<app>sudo): pam_unix\(sudo:session\): (?<vendor_action>session \w+) for user (?<user>\w+) by (?<src_user>\w+)
LOOKUP-action_for_linux_auth = nix_action_lookup vendor_action OUTPUTNEW action
1 Solution

mdessus_splunk
Splunk Employee
Splunk Employee

The answer is in the question 🙂

View solution in original post

ycourbe
Engager

I slightly changed EXTRACT-sudo_open_details so it also works with "su"

^\w+ \d+ \d{2}:\d{2}:\d{2} (?<src>.+) (?<app>\w+).*: pam_unix\(.+:session\): (?<vendor_action>session \w+) for user (?<user>\w+)

For the rest it works perfect with my RHEL. Thanks !

0 Karma

mdessus_splunk
Splunk Employee
Splunk Employee

The answer is in the question 🙂

Get Updates on the Splunk Community!

Developer Spotlight with Paul Stout

Welcome to our very first developer spotlight release series where we'll feature some awesome Splunk ...

State of Splunk Careers 2024: Maximizing Career Outcomes and the Continued Value of ...

For the past four years, Splunk has partnered with Enterprise Strategy Group to conduct a survey that gauges ...

Data-Driven Success: Splunk & Financial Services

Splunk streamlines the process of extracting insights from large volumes of data. In this fast-paced world, ...