Splunk Search

How to write a script to correlate data in a file with an event in Splunk?

amir_thales
Path Finder

Hello,

I want to know if it is possible to do a script which read a file and correlate the data in this file with an event in Splunk.

For example, when I put a USB key in Linux, I have this log:

Jan 31 11:02:51 PFSplunkCentOS5 hald: mounted /dev/sdb1 on behalf of uid 0

and I want to correlate UID 0 with the file /etc/passwd and say uid 0 = root or other user and put root in the event in Splunk like metadata.

Cordially

amir

0 Karma
1 Solution

davpx
Communicator

You don't need a script for this. Take a look at lookups . Write a lookup that has a uid > username correlation and you can run it automatically if needed.

View solution in original post

0 Karma

amir_thales
Path Finder

my problem is solved thank you

0 Karma

amir_thales
Path Finder

Hello davpx,

How can read the /etc/passwd file to correlate the uid with the user because the "lookup" function uses only KML, KMZ and CSV and I want to use the "/etc/passwd" which isn't a KML, KMZ or CSV file.

Thank you
amir

0 Karma

davpx
Communicator

You don't need a script for this. Take a look at lookups . Write a lookup that has a uid > username correlation and you can run it automatically if needed.

0 Karma
Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...