hello I am pretty new using Splunk and I am being tasked to generate multiple of these kinds of reports in Splunk (original reports were from a SQL tool) I really need help in finding the right que...
See more...
hello I am pretty new using Splunk and I am being tasked to generate multiple of these kinds of reports in Splunk (original reports were from a SQL tool) I really need help in finding the right query for this. Especially how to include certain users and exclude others. your help is greatly appreciated!! ————- * Collect all available log sources. * Generate a report that shows Changes to System Sec Config events occurred on the previous day, grouped by source users. • Format: .csv, List of events , table with subset of fields (User, Date/Time, Event, Group, oHost, Host (Impacted), oLogin, VendorMsgID, Domain Impacted), Grouped by User • Schedule: daily • Search window: -24 hours • Expiration: 30 days # Technical Context The following events are of interest Vendor Message IDs - 4727, 4728, 4729, 4730, 4731, 4732, 4733, 4734, 4735, 4736, 4737, 4740, 4754, 4755, 4756, 4757, 4758, 4759, 4783, 4784, 4785, 4786, 4787, 4788, 4789, 4791, 631 AND User is NOT xxx, system, xxx, xxxx, xxxxx, AND User (Impacted) IS NOT (res group name) AND Host (Impacted) IS NOT %sc% (SQL PATTERN), %sd% (SQL PATTERN), ^sc.+, ^sd.+