Splunk Search

Auditing changes in _configracker index via json path data.changes{}.properties{} ?

gazoscreek
Explorer

The configtracker index contains a json path of: data.changes{}.properties{}

In that path, there are numerous objects ... 

data
    changes
         properties

               + ( contains name, old_value, new_value )

               + ( contains name, old_value, new_value )
               + ( contains name, old_value, new_value )

I've tried numerous ways of parsing data.changes{}.properties{} ... but am still finding myself unable to display the name, old_value, and new_value of each object beneath data->changes->properties ...

Ultimately, I'd like to be able to render a table of "name" where an old_value exists so that we can alert on changed correlation searches in ES.

ie: where "name" = search (and both old_value and new_value are not empty)
{ [-]
             namesearch
             new_value`sysmon` foo
             old_value: `sysmon` bar

           }
or: where "name" = cron_schedule (and both old_value and new_value are not empty)
{ [-]
             namecron_schedule
             new_value6-56/10 * * * *
             old_value: */10 * * * *

           }

 or: where a search schedule was enabled
{ [-]
             nameenableSched
             new_value1
             old_value: 0

           }



Labels (1)
Tags (1)
0 Karma
1 Solution

ITWhisperer
SplunkTrust
SplunkTrust

@yuanliu is on the right lines. Unless you want something from the changes level, the first mvexpand is redundant. Also, you still need to do a further spath to extract the fields you are interested in

| spath path=data.changes{}.properties{}
| mvexpand data.changes{}.properties{}
| spath input=data.changes{}.properties{}
| where isnotnull(old_value) AND isnotnull(new_value)

View solution in original post

gazoscreek
Explorer

Thank you @yuanliu & @ITWhisperer ... this was quite helpful ...

the isnotnull doesn't seem to work where the values appear to be empty, but this did:

index=_configtracker component=ConfigChange earliest=-6h host=mysearchheads* data.path="/opt/splunk/etc/apps/*"
| spath path=data.changes{}.properties{}
| mvexpand data.changes{}.properties{}
| spath input=data.changes{}.properties{}
| table data.changes{}.stanza, name, old_value, new_value
| regex old_value="[A-Za-z0-9]"
| regex new_value="[A-Za-z0-9]"

 Thank you very much.

0 Karma

yuanliu
SplunkTrust
SplunkTrust

You need to apply mvexpand to any array in the path.  In your case, you have two nested arrays,  data.changes{} and data.changes{}.properties{}.  To reach them, you use spath.  Something like

| spath path=data.changes{}
| mvexpand data.changes{}
| spath path=data.changes{}.properties{}
| mvexpand data.changes{}.properties{}
| where isnotnull(data.changes{}.properties{}.old_value)
Tags (2)

ITWhisperer
SplunkTrust
SplunkTrust

@yuanliu is on the right lines. Unless you want something from the changes level, the first mvexpand is redundant. Also, you still need to do a further spath to extract the fields you are interested in

| spath path=data.changes{}.properties{}
| mvexpand data.changes{}.properties{}
| spath input=data.changes{}.properties{}
| where isnotnull(old_value) AND isnotnull(new_value)
Get Updates on the Splunk Community!

More Control Over Your Monitoring Costs with Archived Metrics!

What if there was a way you could keep all the metrics data you need while saving on storage costs?This is now ...

New in Observability Cloud - Explicit Bucket Histograms

Splunk introduces native support for histograms as a metric data type within Observability Cloud with Explicit ...

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...