Splunk Enterprise Security

Splunk Macro cim_Alerts_indexes Error

lucilleddajab
Explorer

Hi, we are using a Splunk Cloud ES and we can't seem to edit the base search macro of the "Alerts" datamodel. The macro in question is, " cim_Alerts_indexes" and it appears it has an extra parameter which generates an error when this macro is ran manually.

Error: "Error in 'search' command: Unable to parse the search: Comparator '=' has an invalid term on the right hand side"

And that is due to the fact that the macro SPL is set up as follows:

 

(index=(index=azure_security sourcetype="GraphSecurityAlert") OR (index=trendmicro))

 

 

The extra "index=" in the beginning is what's messing it up. It should be removed.

However, when we try to go to Settings -> Advanced Search and click on this macro, we are taken to the CIM Setup interface (Splunk_SA_CIM) which shows the config settings of the macro, including the:

 

Indexes whitelist = azure_security,trendmicro
Tags whitelist = cloud, pci

 

Notice, the editable configs do not include the definition which is:

 

(index=(index=azure_security sourcetype="GraphSecurityAlert") OR (index=trendmicro))

 

 
So can anyone assist how we can correct this?

Regards

 

Tags (1)
0 Karma

meetmshah
SplunkTrust
SplunkTrust

Hello @grep, Can you please try removing whitelisting from the "CIM Setup" page and only have condition available from Macro page?

Let me know if it doesn't work and I can troubleshoot.

0 Karma

dural_yyz
Motivator

You need a btool debug output for macros.conf on the ES SHC.  The app is reading the proper file but it appears you have some override of that stanza coming from and outside file.

0 Karma

lucilleddajab
Explorer

Hi @dural_yyz,

Thanks for your response. I'm not sure if we can do btool as this is in Splunk Cloud ES.

 

 

0 Karma
Get Updates on the Splunk Community!

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...